fbpx

Representative offices: 

Request callback
btn

Прийшов час спинити острах нових технологій: як змінити звичних виробників рішень і впровадити більш прогресивні технології у свою інфраструктуру?

Articles and reviews

"Зміни – це незмінність в мінливих обставинах". Семюел Батлер.


Багато компаній мають, так званий, список «рекомендованих вендорів», технології та рішення яких імплементувалися в ІТ-інфраструктуру компанії протягом довгого часу. Основою формування таких списків стала зовсім не суб'єктивна думка CTO або членів правління, а ситуація, що склалася на підприємстві.

На етапі побудови комплексної інфраструктури з нуля її творці відштовхувалися від специфіки діяльності конкретного бізнесу, його основних процесів і операцій, числа співробітників, необхідності побудови територіально-розподіленої мережі. Цими факторами і був обґрунтований вибір фундаментальних програмно-апаратних рішень для побудови мережі підприємства, системи зберігання даних і аварійного відновлення, створення надійного і захищеного периметра тих чи інших виробників.


Однак основа стратегії будь-якої компанії, яка збирається функціонувати, як мінімум, десятки років – це зростання. Бізнес розвивається: з'являються філії, розширюється мережа, збільшується кількість співробітників, у тому числі тих, що працюють віддалено, ускладнюються і операційні процеси. Все це змушує прямо пропорційно видозмінюватися, модернізуватися і розширюватися IT-інфраструктуру даного бізнесу і вимагає впровадження нових систем.

Проєкт впровадження нової архітектури завжди потребує кропітливої роботи. Необхідно знайти кращий продукт, звернутися до проєктної практики, можливостям інтеграції обраного продукту з уже присутніми рішеннями інших виробників; навчити IT-персонал навичкам роботи з новими програмами/технологіями, забезпечити першокласний сервіс і підтримку. Найчастіше до прийняття таких рішень підходять виважено: компанія купує довгостроковий актив, вкладаючи гроші на перспективу (в надії отримати не просто технічне рішення, а капітал).


Безумовно, кожне прийняте рішення, особливо що стосується "чогось нового" несе за собою певні ризики або можливі негативні наслідки. У цей момент, що абсолютно нормально, включається елементарна психологія. Людям в сучасному світі, перевантаженим інформацією і подіями, дуже важко не відчувати тривожних переживань, страху і закономірної фобії невідомості. Саме тому більшість компаній обирають шлях найменшого опору – вони звертаються до вже перевірених виробників, адже тоді ризики зводяться до нуля.

Але, як відомо з життєвої практики, знайти дійсно краще можливо тільки якщо ви готові глибоко копати, трансформуватися, "дивитися під капот", тестувати та бути гнучким.


Дослідження, проведене компанією IDC у 2019 році, показує, що 61,2% підприємств зі списками звичних постачальників вважають, що подібне явище обмежує їх здатність обирати оптимальні рішення. Виникає цікаве питання: так чому ж замовники корпоративних систем зберігання даних залишаються у відносинах з постачальниками, які не відповідають їх новим потребам?

Підприємства прагнуть встановити відносини з певним вендором систем зберігання, оскільки довгострокові відносини іноді приносять неформальні вигоди: адміністратори будуть навчені роботі з системою постачальника, буде легше пройти навчання за функціями нових випусків, ніж знайомитися з зовсім іншим виробником.


Водночас 55,6% підприємств зазначили, що вони змінили звичних їм виробників з наступних причин:

  • Неповоротний збій, наприклад, втрата цілісності даних, тривалий збій або невирішена проблема підтримки.
  • Постійна низька якість підтримки клієнтів.


Є й компанії, які задоволені лише частково, але з тієї чи іншої причини продовжують залишатися з обраним виробником. Замовник може бути незадоволений, але якщо він вважає, що потенційні вигоди від переїзду не перевищують ризики та/або витрати, простіше залишитися з посереднім рішенням.

Однак постійна незадоволеність рішенням для зберігання даних або технічною підтримкою часто зводиться до нездатності виконати SLA з продуктивності та доступності, що несе за собою величезні незворотні наслідки для бізнесу. Перехід до системи, яка може відповідати всім вимогам, стає єдиним правильним рішенням.


В інноваційній різноманітності продуктових рішень у світі IT стає зрозуміло, що постійно рухатися в технологічному напрямку одного вендора безперспективно, необхідно переорієнтуватися на бізнес-логіку. Використання нових технологій, таких як твердотілі носії, програмно-обумовлені моделі, штучний інтелект, машинне навчання і деталізоване блокування діапазонів байтів потенційно пропонує єдину можливість для поліпшення економіки підприємства і, навпаки, тільки зменшують ризик розгортання та експлуатації, що може бути недосяжним з застарілими сховищами.

Припиніть циклічно змінювати системи, що вийшли з ладу, і перейдіть до концепції консолідації сховищ даних, яка дозволить створити довгостроковий прибуток і стане фундаментом для майбутніх успіхів! Коли підприємство може вивести з експлуатації дві, три або навіть чотири окремі системи, перейшовши на архітектуру, спеціально спроєктовану для забезпечення продуктивності багатопетабайтного масштабу, це дає мультиплікативний ефект для економії витрат. Завдяки централізації управління в такій системі підвищується якість адміністрування, а продуктивність і доступність поставляється в масштабах, необхідних для економічного виконання широкого набору SLA.


Другим важливим фактором варто врахувати сукупну вартість володіння технологіями. Крім первісної закупівельної ціни, підприємствам необхідно зауважити простоту адміністративного використання (і пов'язані з цим нові витрати на навчання), можливість інтеграції в нові парадигми (наприклад, контейнери та хмара), які будуть розгорнуті, поточні витрати на технічне обслуговування, засоби перенесення даних і загальну ефективність нового сховища. Більш ефективні рішення можуть значно збільшити щільність продуктивності, що дозволяє набагато меншим системам, які споживають менше енергії та площ, обробляти робочі навантаження бізнес-процесів.


Постачальники систем зберігання, які можуть забезпечити більш щільну консолідацію сховищ, поряд з функціями мінімізації ризиків, згаданими вище, можуть запропонувати надзвичайно вагому причину для зміни вендора.

Наприклад, такими характеристиками володіють корпоративні рішення зберігання даних від прогресивного виробника Infinidat. Крім того, вендор підтримує свої системи з гарантіями продуктивності та доступності, що є одним з індикаторів того, що виробник упевнений у своїх здібностях задовольнити будь-які вимоги бізнесу.

Разом з Infinidat ви можете забути про невдоволення від технічної підтримки, відчути сильну економічну вигоду, яка заснована на меншій сукупної вартості володіння (TCO), і отримати технологію петабайтного масштабу, яка недоступна у інших постачальників, що дозволяє перейти на значно кращий рівень операцій.


iIT Distribution, як офіційний дистриб'ютор компанії Infinidat, спираючись на результати незалежних досліджень, гарантує плавний, а головне, помірний перехід і міграцію даних на системи зберігання даних Infinidat і нагадує: щоб побачити щось нове, потрібно зробити щось нове!


Матеріал створено на основі статті Infinidat.

Back

Achieve petabyte-scale data protection with lightning-fast recovery!

Release

Modern data protection and disaster recovery architectures require the minimum possible recovery time to ensure seamless data handling and application availability.


Infinidat InfiniGuard offers unmatched speed and reliability in data backup and restore capacity for high-performance business continuity and disaster recovery. Learn more about Infinidat by link. Built using the market-leading InfiniBoxto optimize performance and target-side dedup processing, InfiniGuard enables you to maximize effective capacity for multi-petabyte environments. Learn more about InfiniGuard or order a consultation on this solution by following the link. In this article we will consider all the benefits of the InfiniGuard backup solution!


Restore Speed: realize the fastest possible recovery time to ensure uninterrupted access and availability to your data.


CyberRecovery: protect your backup from malicious cyberattacks.

Cyberattacks and ransomware target backup solutions and storage with ease never before seen and backup is no longer the last line of defense. InfiniGuard’s CyberRecovery capabilities neutralizes the growing threats from ransomware into data centers of large companies, as well as cloud service providers, and provides high protection for the entire backup environment.


CyberRecovery capabilities help you fight back by protecting your backup with immutable snapshots that cannot be deleted, encrypted, or changed. Leverage InfiniGuard’s unique capabilities to validate your recovery environment and begin your recovery process near-instantaneously. As a result, you can be confident in your ability to recover from cyberattacks, technical malfunctions, or human error, without compromise to data integrity.


Reliability: attain exceptional reliability and security.

InfiniGuard is designed using the unmatched availability of the InfiniBox with an innovative self-healing architecture and redundant hardware components. Redundant deduplication engines, in an active/active/passive configuration utilizing stateless recovery, means a fast recovery of the engine state on the standby node if a primary node failure occurs; resuming normal backup/recovery operations quickly and with full data integrity.


Consolidation: reduce data center footprint and consolidate data protection.

With effective capacity up to 50PB+ and multiple protocol support (NFS, RMAN, OST, CIFS, and VTL), it is easier than ever to consolidate data protection for multiple systems in a single high-capacity solution. Consolidation with InfiniGuard also reduces data center footprint, lowers power and cooling costs — significantly reducing your data protection TCO.


Performance: accelerate restore performance for the most demanding applications.

Intelligent read-ahead caching, driven by massive parallelism, is core to InfiniGuard’s ability to address business continuity goals. Predictable performance, based on this next-generation cache management and efficient media orchestration, dramatically reduces restore times to meet the most demanding service-level agreements.


Ease of Management & Integration: simplify operations with InfiniGuard.

Built using the market-leading InfiniBox includes an easy and intuitive HTML5 GUI that makes typically complex backup, replication, and recovery operations simpler. The result is an enterprise data protection system that’s highly efficient and simple to manage. It supports most major backup applications already deployed in the data center.


Total Cost of Ownership: the market leader in price and performance.

InfiniGuard presents considerable savings in acquisition costs as well as operational costs. This solution has the lowest TCO for a solution at this usable/effective capacity. InfiniGuard subscription model is a proportional usage fee in which customers can increase or decrease usage as needed. As a result, customers receive a 100% guarantee of uninterrupted operation and secure data migration!



iIT Distribution qualified technical specialists (iIT Distribution is the official distributor of Infinidat in Ukraine)and Infinidat product managers are ready to provide any support to partners and customers at every stage of the project. To buy Infinidat InfiniBox or InfiniGuard backup, recovery and data protection solution, get advice on choosing a solution or additional information, please call +38 (044) 339 91 16, via the feedback form on the website or by e-mail [email protected]

Back

Infinidat — is the best choice for Gartner Peer Insights 2021 customers!

News

Infinidat has received the 2021 Gartner Peer Insights Customers' Choice in the "Primary Storage Arrays" category.

The company becomes the owner of this award based on reviews and evaluations of customers and end users for the third year in a row!

This recognition is especially important for the manufacturer Infinidat, because the choice is made directly by customers. In total Infinidat has received 390 reviews (160 of which in the last 12 months) from verified customers with an average overall rating 4.9 stars of 5.



Companies recognize Infinidat for its reliability, performance, scalability, unique architecture and best support. There are some striking examples of reviews that have been used in hundreds of Gartner Peer Insights Customers' Choice ratings:

«We have Infinidat arrays that have emerged over the last two years, and their systems are great for our environment. We have moved from the old XIO to the Ibox and they work great. Infinidat support is the best, it's nice to solve any issues with them», – said the SZD administrator at the service company.

«Fantastic system, excellent performance, reliability and observability. During 25 years of working in the field of corporate storage, I have never met a supplier and a system with which it would be so easy to work», - said an expert in the field of IT infrastructure of large retail.


Infinidat creates products that have a huge impact on the success of people and organizations, because they help thousands of companies achieve more. The careers of millions of IT professionals and the work of IT - teams around the world depend on the quality and performance of these vendor products and services. That is why recognition from engineers and executives who use Infinidat's solutions on a daily basis is critical.

«We are delighted that the experience of our customers has led to the recognition of the best vendor for enterprise-class data storage in a highly competitive industry, – said Phil Bullinger, CEO of Infinidat. . – We not only provide large-scale innovative storage technologies to create a flexible private cloud, but also strive to provide exceptional customer service».


About Peer Insights

Gartner Peer Insights Customers' Choice — is an online - platform for vendor ratings verified by real customers. IT - professionals and management of departments and companies working with technology leave honest feedback and evaluate the various software products they work with. Because of this evaluation system Gartner Peer Insights helps company executives to make informed decisions about purchasing new technologies and for their suppliers — the opportunity to improve their products based on objective, unbiased feedback from their customers.


About Infinidat

Infinidat's software-focused architecture provides less millisecond latency, 100% availability, and scalability at a much lower total cost of ownership than competing storage technologies. To learn more about the manufacturer on our website. The company expanded its InfiniBox product line with the first 100% solid state technology of the InfiniBox SSA storage system recently, which allows to achieve 3 times more performance with 40% less delay. Tpo learn more about the innovative solution is possible by the link.


About iIT Distribution

iIT Distribution is the official distributor of Infinidat solutions in Ukraine. We provide the opportunity to order, buy, test or receive additional information about the vendor's solution. We also work closely with our partners to meet the needs of end customers and provide full support for the design and implementation of projects based on Infinidat solutions. We remind you that Infinidat has previously launched a new partner accreditation program that helps respond to complex requests from corporate customers. Improving the affiliate program helps to improve the quality of customer service and exceed their expectations. You can get acquainted with the intricacies of the affiliate program by the link or get advice from our certified professionals by filling out the feedback form on our website.

Back

CrowdStrike took first place in the market share of Modern Endpoint Security 2020!

Release

According to an IDC report, CrowdStrike is «on its track to become the first vendor to have annual revenue in the enterprise endpoint protection market to exceed $ 1 billion».

CrowdStrike took first place by the share of revenue in 2020 in the global market of corporate security endpoints according to IDC Worldwide Corporate Endpoint Security Market Shares. The report is further evidence of CrowdStrike's market leadership and demonstrates the proven effectiveness of the CrowdStrike Falcon platform as the company continues to outperform its competitors in performance, strategy and innovation.


The report said the COVID-19 pandemic facilitated a rapid transition to a remote work environment and forced organizations to prioritize increased costs for EDR solutions to enhance security in a high-risk environment. Organizations around the world have moved from local data centers to public clouds and expanded the need to protect both endpoints and workloads in their environments at a time when ransomware and phishing attempts were growing daily as attackers used the pandemic.


Unlike customers who choose other endpoint security vendors, those who choose CrowdStrike get the most out of crowdsourcing data, which can be scaled across enterprise networks and different ecosystems through the use of cloud and machine learning-based automation.


CrowdStrike is a pioneer in the field of modern endpoint security through innovations such as the introduction of the first and largest cloud knowledge base on security, which receives about 6 trillion unique data from endpoints per week. The CrowdStrike security cloud helps protect customers of all sizes with automated threat analysis and next-generation EDR.


According to Michael Suby, research vice president, Security and Trust at IDC, “The corporate endpoint security market is highly competitive and evolving. With threat actors relentlessly targeting end users and their devices as their first steps in attack campaigns, endpoint security is an essential first line of defense. As a first line of defense, organizations want more. They are expecting vendors to deliver a broader set of integrated and synergistic prevent, protect, and post-compromise detect and respond capabilities.”

CrowdStrike completely handles this. Customers get better protection, better performance, and lightning-fast payback with CrowdStrike from the Falcon cloud platform.


CrowdStrike recently took the lead in the 2021 Gartner Magic Quadrant among endpoint protection platforms. In addition, CrowdStrike received the highest score in the 2021 Gartner Critical Capabilities for Endpoint Protection Platforms Report. The company was also named the leader in endpoint security software in the Forrester Wave Q2 2021 report, receiving the highest scores on 17 criteria.


iIT Distribution is the official distributor of CrowdStrike. Our partners, customers and organizations of all sizes can get access to CrowdStrike Falcon, ordering a trial version from us.

Back

A10 Thunder ADC application delivery controller in our warehouse!

News

In today's digital business environment, companies of all sizes and industries (financial institutions, service providers and cloud operators, retail, etc.) should remain flexible and innovative to compete, grow and thrive. They all manage large and critical applications. Without their reliable productivity and availability the work of employees can stop, customer service will become impossible which will cause the wave of disruptions in the work of the whole business. More than 40 percent of businesses report that one hour of downtime can cost their business between $ 1 million and $ 5 million.


All these requirements have led to such a decision as application delivery controller (ADC), has become one of the most important components of a modern digital infrastructure of any company. An application delivery controller can help maintain a high quality of user interaction by providing a unified approach to performance management, troubleshooting, and traffic optimization in complex environments with holistic visibility of devices, applications, policies and users.


ADAPTIVE SUPPLY OF ADDITIVES AND SAFETY

Special application delivery controller Thunder ADC from the leader in the development and production of traffic balancing solutions A10 Networks ensures high availability, performance and security of applications. It is possible to learn more about the manufacturer by the link. The A10 Networks load balancer helps reduce network downtime, sustain business continuity, and create high-availability systems that span global data centers and numerous clouds. In addition the Thunder ADC lineup has the highest bandwidth in the industry when transmitting application traffic which makes this solution one of the best in the industry. Learn more about the Thunder ADC line by the link.

As part of its global web traffic management capabilities the A10 Networks load balancer can evaluate the performance and response time of each resource in your environment and then make smart adjustments to application traffic to prevent the impact of server failure on users. Also the A10 Networks ADC solution can help you use the public cloud as a backup for your on-premises data center by using global load balancing on the server to determine when and how to use that capacity and then redirect traffic accordingly.


While application performance and availability are key to choosing the right ADC, A10 Networks does not stop there and pays special attention to cybersecurity prevention.


Load balancers from this vendor provide the ability to apply uniform policy compliance schemes to each platform you use which simplifies the provision of the same consistent information security for applications and services:

  • Sequential authentication management on cloud and local platforms allows you to support the Zero Trust security model.
  • Thunder ADC security measures such as security analytics, DDoS attack protection, web application firewalls (WAF), modern SSL / TLS encryption standards and threat analysis provide a multi-tiered approach to cybersecurity for deep protection.


Thunder ADC can be applied as a virtual machine or container. Its placement is possible in the core of the network, in a multi-cloud environment (in private and public clouds). The A10 Networks application delivery controller supports a multi-user environment which allowing you to configure application delivery partitions (ADPs) that are virtual ADCs.


A10 THUNDER ADC IS ALREADY IN OUR WAREHOUSE

One of the representatives of the model range of load balancing solutions — А10 Thunder ADC 1040 already presented in our warehouse! This device can be commissioned to ensure efficient application delivery, load balancing and information security. In addition, the model 1040 can act not only as a controller: it contains carrier-grade NAT functions to expand the use of IPv4 address space and migration to IPv6. Using these various functions is possible by switching operating modes.



This decision:

  • load balancing at levels L4-L7;
  • provides several levels of security: WAF (Web Application Firewall) and DAF (DNS Application Firewall) functionality, single sign-on authentication (SSO), advanced encryption methods (including PFS / ECC).


Thunder ADC 1040 is characterized by high capacity, scalability and the ability to program to adapt to a constantly changing environment. This solution reduces the complexity of the network and the total cost of owning it.


WHY IS IT NECESSARY TO CHOOSE A SOLUTION FROM A10 NETWORKS

By choosing a load balancing solution from A10 Networks you will get:


High application readiness.

Thunder ADC uses several load balancing techniques to efficiently distribute the workload across all available servers while constantly assessing the status of the program. Client requests are forwarded to servers that contain the required content and are able to respond as quickly as possible to requests for optimal delivery of applications and content.


Application protection.

Thunder ADC provides protection against zero-day attacks and other new application-level threats with WAF and DAF, and allows you to centrally manage several aspects of authentication, authorization, and accounting.


Advanced encryption capabilities.

Thunder ADC undertakes complex calculations related to the implementation of the latest cryptographic standards. This maximizes content protection, speeds up delivery and reduces infrastructure costs.


Management automation.

Thunder ADC allows you to fine-tune more than 1 000 individual partitions in your work to implement system policy rules for applications, services and users, as well as to consolidate devices.


Business continuity.

Thunder ADC performs the advanced function of global load balancing on servers (GSLB) to optimize the delivery of applications from different sites.


Competitive advantages.

Thunder ADC overcomes the negative effects of long delays in packet transmission over WAN- channels and inefficiency of programs, providing fast customer service.


EVALUATE THE BENEFITS

iIT Distribution is the official distributor of solutions from A10 Networks. Request a demo of the A10 Thunder ADC application delivery controller or other products to ensure cybersecurity and deploy reliable, optimized, and secure services for your infrastructure on our site.


We work only with market leaders and innovators in their fields, so customers get the best products that solve specific problems, rather than imposing unnecessary functionality. The leadership of A10 Networks products is proven by numerous successful experiences of use by the largest telecom operators, cloud providers and companies from the Global Fortune 500 list worldwide!


Want to know more? All the necessary additional information will be gladly provided to you by our certified specialists! Contact us in any convenient way specified in the section "Contacts" on our site.

Back

The announcement of a new solution for storing InfiniBox SSA corporate class data from infinidat!

Release

On the 16-th of June a world leader in enterprise class storage solutions providers Infinidat presented its new platform InfiniBox SSA, with the help of which expanded its product line by InfiniBox.

InfiniBox SSA is the first system which use 100% solid state technology for permanent storage. The combination of Infinidat Neural Cache's patented machine learning algorithm and increased DRAM cache takes revolutionary InfiniBox performance to a new level. The available capacity of InfiniBox SSA is 546 TB, and when using compression, this value reaches 1092 TB. IOPS value — up to 1.5 million.

INFINIBOX SSA PROVIDES HIGHER PERFORMANCE THAN AFA SYSTEMS

Although both DRAM and SSD are solid-state technologies, DRAM is much faster than flash-based SSDs.

According to the results of testing and comparison with the main solutions based on flash arrays InfiniBox SSA surpassed all AFA products and achieved 3 times more performance with 40% less delay even in multiple failure scenarios.



INFINIBOX SSA REMAINS INFINIBOX

InfiniBox SSA — is an additional system to InfiniBox, but not a replacement. InfiniBox SSA is created for workloads that require low levels of latency on a regular basis. At the same time, the solution complements the standard InfiniBox system for general purpose applications, which are mainly used in the corporate environment.

The common software base for the standard InfiniBox and InfiniBox SSA provides data transfer between platforms allowing customers to reduce the total total cost of ownership while optimizing latency.

  • InfiniGuard як і раніше найкраще підходить для переважної більшості стандартних застосунків, забезпечуючи в середньому продуктивність з низькою затримкою
    при виключно низькій вартості володіння при місткості в кілька петабайт. Learn more about InfiniBox by the link.
  • InfiniBox SSA — is a solution for unique atypical loads that require stable predictable performance with the lowest possible delays.

Therefore, InfiniBox SSA, like all other Infinidat solutions, provides consistent uncompromising and proven reliability, availability, advanced features, ease of use and quality of customer service.


“Our market research has confirmed that some enterprise applications require super low latency and extremely high performance. Achieving this balance and maximizing speed was a difficult task that required a new, non-traditional approach. The decision to move the internal FDD to solid technology and get the most out of any media - is a new look at how to better address performance-sensitive applications”, —said Paul Nashawati, senior ESGanalyst.

INFINIBOX SSA — IS A GUARANTEE OF STABLE OPERATION WITH THE LOW DELAY

Feedback from customers around the world who have already evaluated and deployed InfiniBox SSA tested for 6 months was extremely positive.

Company iIT Distribution, офіційний дистриб'ютор рішень Infinidat, повідомляє про те, що найприємнішим фактором для перших користувачів даного рішення стане те, що InfiniBox SSA не тільки перемагає в битвах за продуктивність, але і робить це за дуже конкурентними цінами.

InfiniBox SSA is already available worldwide, including in Ukraine! We invite all corporate customers and partners to quickly gain and appreciate not only lightning speed, but also the benefits of ease of use, scalability, high availability and low total cost of ownership (TCO) of the InfiniBox SSA platform. You can order, purchase, test or receive additional information about InfiniBox SSA by ordering a call or filling out the feedback form on our website.

Back

The invitation to the third virtual forum of CrowdStrike

Release

CrowdStrike, the world leader in endpoint protection invites everyone to join on the 17 - th of June the third CrowdStrike Virtual Forum 2021 to get a huge experience from the first people in the field of cybersecurity online!

This exclusive digital event provides an unparalleled opportunity to hear the opinion of a research team of security strategists and technical experts from around the world, as well as CrowdStrike customers who will share their experience in implementing and integrating CrowdStrike cybersecurity solutions and, which is important, impact on their business and results.


New threats appear every day, and the use of new generation technologies and methods — is the only way to stop criminals.


Why it is important to participate?

With the help of this forum you will learn how to transform effectively your security system, how to prioritize security and invest in it with a result oriented approach, how to protect and defend against the risks of information security breaches.


The program

Like cybersecurity the event is evolving at an exorbitant pace, and new speakers are being added to the CrowdStrike Virtual Forum discussion panel every day. You can always watch the latest program by the link.

We encourage you to pay attention to the speeches of CrowdStrike Product Director Amola Kulkarni and Humio Strategic Alliance Director Ken Green. Humio is the only journal management platform that provides complete real-time and full-scale tracking of all streaming logs and it is now a part of CrowdStrike. Through the collaboration of two leaders, Humio and CrowdStrike can open a enterprise-level solution that can handle the processing of large and ever-increasing amounts of event data, enabling organizations to collect, monitor, analyze and interact with all structured and unstructured data in their environment, which help to solve corporate IT tasks, including within the DevOps and DevSecOps models. You can learn more about the merger of Humio and CrowdStrike and its benefits for customers in our news by the link.

The most interesting cases

Business executives and security executives from companies such as Ernst & Young, the multinational human resources consulting firm Randstad, technology company MED-EL and even global universities will share their practical experience of using CrowdStrike products and the business results of their implementation.


The hottest and most anticipated event within the forum for partners and clients from Ukraine will be the speech of Adrian Pavlykevych, who is the Director of Information Security of ukrainian company SoftServe, which is known worldwide! It is an IT company working in the field of software development and consulting services. SoftServe has extensive experience in software development in the areas of Cloud, Security, UX Design, Big Analytics, Internet of Things.


Speed and flexibility in software development is of paramount importance for the company, as these factors allow better customer service and more effective competition in the market. But security is often seen as a barrier to DevOps, as many believe it hinders the rapid delivery of new applications and the ability to scale the infrastructure to meet business opportunities.


CrowdStrike knows how to implement the DevOps model without sacrificing security through automated compliance policies, detailed controls, and configuration management techniques.


In addition, the development of cloud technologies, as well as containers and microservices, has radically changed the way software is developed, but at the same time has led to new security risks that need to be considered. Organizations that want to integrate IT operations, the security team, and application developers need to make security a key component of the software development workflow. SoftServe will tell how they succeeded from its experience .


Choose the right tools for continuous security integration! Learn how CrowdStrike can help maintain the health and stability of your cybersecurity at CrowdStrike Virtual Forum 2021!


GO TO REGISTRATION

Back

The first deliveries of Aruba network equipment

News

Recently, iIT Distribution received Aruba Certified Partner status, a Hewlett Packard Enterprise company and began supplying and selling high-performance, reliable, durable equipment from Aruba — a world leader in wireless networking with a wide range of functionality. You can read the official press release about the beginning of the partnership between iIT Distribution and Aruba by the link.

Aruba focuses on wireless solutions, developing innovative products to ensure mobility in the corporate space. You can learn more about the manufacturer by the link. So in this way in our warehouse appeared the first positions of the Aruba equipment!


Network switches of the Aruba 6100 series

The Aruba 6100 line of switches — is an advanced family of entry-level switches based on the Aruba ASIC architecture with the CX operating system, designed for corporate small and medium business networks.

On the Aruba 6100 12G PoE Class4 2G / 2SFP + 139W L2 switch you can build a small office or branch office network with 1Gb links. The switch ports support Roe (Power over Ethernet) functionality up to 139W. This means that both PCs and camcorders, wireless access points, IP phones, and other equipment that supports Roe functionality can be connected to the switch througt the Ethernet. This switch has a high bandwidth (up to 45 million packets / sec), compactness and no fan. High functionality, ease of installation and ease of management make this switch one of the best on the market.



Aruba gateways of the 9000 series

Aruba 9000 series gateways provide high network performance, SD-WAN and security features in a compact and economical form factor. Ideal for branches and small campus networks. The gateways of this series provide a key role in the Aruba SD-Branch solution, which combines WLAN, LAN, SD-WAN and security for distributed enterprises. Designed with the flexibility to support the most demanding branch environments and they are up to 10 times the maximum bandwidth of typical SD-WAN devices.

The versatility of the Aruba 9004 (RW) Gateway allows it to work as a router, wireless access point controller, SD-WAN device, firewall, VPN hub, etc.

Management of these network devices is possible both from the console, and through software Aruba AirWave or Central, which can also be purchased from us as from a certified partner Aruba. Learn more about the benefits of a cloud solution for monitoring, managing, controlling and optimizing all nodes based on Aruba Central artificial intelligence by the link.

Aruba access points

In addition that we expect the delivery of Aruba AP-505 (RW) and Aruba AP-303 (RW) access points soon, on which you can build a full-fledged, multifunctional wireless network of a small office or branch.

Aruba network access points provide the convenience of expanding and scaling networks while maintaining security and performance. They allow you to manage and protect your network without having to control its individual components. Aruba offers both simple devices for providing basic functionality of the Wi-Fi network, and very powerful, for networks with a large number of users and speeds up to 1.73 Gbps, as well as secure models for work in harsh conditions, such as the open air.


By purchasing network equipment of these series, you get ease of operation, reliable and long-lasting network operation at the optimal budget. Because of these solutions companies can upgrade their network, reach a new level of fast and secure connection of new devices and processing lightning-fast traffic.


Like the official partner of Aruba, we are constantly expanding our product range and making solutions from the global brand available to end customers throughout Ukraine.

You can find out if you are currently available or purchase Aruba equipment by calling us on our website or by filling out a short feedback form. Our highly qualified specialists will promptly provide you with complete information and advice on Aruba solutions for building corporate networks of any scale, as well as help with the audit of your existing infrastructure and the selection of optimal solutions for your business!

Back

GTB Technologies comprehensive DLP solution received a certificate from the State Service for Special Communications and Information Protection of Ukraine

News

The Administration of the State Service for Special Communications and Information Protection of Ukraine has issued a certificate of conformity to iB Distribution for GTB Technologies software products.

The results of the expert assessment confirm that the information security system GTB DLP Suite meets high standards of technical information protection, the requirements of the current legal framework for security and can be used to create comprehensive information security systems for various purposes in public and commercial organizations.



The obtained certificate allows iIT Distribution to work with information that contains a state secret in the implementation of comprehensive security systems based on the GTB DLP Suite solution in all government, financial, international and other organizations where certified software products are required. Dozens of government organizations and hundreds of businesses will now be able to appreciate all the benefits of comprehensive information protection against GTB DLP leaks, which allows you to track not only text documents, but also drawings, video and audio files; controls both cloud services and temporary files, webmail and the clipboard.


GTB Technologies has long entered the DLP market, but despite this, it is actively developing its products and constantly taking into account the growing requirements for information security. Its solution allows you to intercept and analyze different types of network traffic, control access to data on different network devices. And also to control access to the information in file network storages and on removable devices. The system easily integrates with other information security monitoring systems and supports a large number of protocols for interception and analysis.


Learn more about GTB DLP Suite

Back

How subtle attacks maximize hackers' profits and what defensive actions need to be taken immediately

Articles and reviews

Demanding programs change their image. Do they pay ransom, how to protect themselves and what to do in case of ransomware attacks?

The main news since the beginning of last month have been allegations of criminal activity by hacker groups around the world in order to obtain funds for stolen and encrypted data. Therefore, the month of May was marked by a number of major cyberattacks, including the use of software ransomware.


WHAT HAPPENED?

Liverpool's subway has been hit by a Lockbit encryption attack, a Brazilian state's court system has been shut down due to malicious file encryption on computers on the system, and Babuk Locker hackers who attacked the Metropolitan District of Columbia have threatened to pay bribery reveal police informants.

The Conti attack seriously undermined Ireland's healthcare system and its affiliates insurance giant AXA were subjected to cyberattacks using a ransomware program, by which hackers stole 3 TB of confidential data from Asian units of AXA.


The target of all these attacks, unfortunately, are critical infrastructure, government and commercial social institutions that function as life support systems for our daily lives. Thus, attacks on such facilities can lead to far-reaching consequences from the activities of criminal groups.


LARGE CORPORATIONS CAN'T SUPPORT

Even the security of companies like Apple was attacked: the brand fell victim to extortionists. A group of cybercriminals, Sodinokoby, stole confidential information about the brand's future products (MacBook laptops and other devices) through the REvil blackmail program, hacking into Apple Quanta Computer (Apple's partner) systems. Hackers were waiting for a ransom from Quanta Computer of $ 50 million by April 27 and threatened to publish more than a dozen diagrams and drawings of components. It was also noted that the size of the ransom could be reduced from 50 million to 20 million, if it is paid by May 7. Later, REvil malware operators removed stolen Apple schemes from their data source site for unknown reasons. At the same time, stolen data from another large company was offered for purchase in the darknet this month.


Spanish Glovo food delivery service, who fell in love with Ukrainians, also felt the effects of a hacker attack during which, the data of tens of millions of users (160 GB of data with information about names, phone numbers, passwords) were put up for sale for $ 85,000.


Toyota suffered a double cyberattack in May: the first hit European operations of Daihatsu Diesel Company, a subsidiary of Toyota, and later Toyota Auto Parts Manufacturing Mississippi uncovered another attack using a ransomware program. Reports say some financial and customer data has been stolen and made public by attackers.


THREATS OF THE MODERN ECONOMY: ATTACK ON CRITICAL INFRASTRUCTURE

The largest ransomware attack during this period halted the largest US pipeline. On May 6, the operator of the Colonial Pipeline pipeline was subjected to a cyberattack by the DarkSide group, as a result of which the company was forced to suspend the transportation of fuel along the entire length of the 9,000 kilometer pipeline. DarkSide penetrated the Colonial Pipeline network and received almost 100 GB of data. After receiving the data, hackers blocked the data on some computers and servers, requesting a ransom. In case of non-payment, hackers threatened to leak data. The Colonial Pipeline website was unavailable, and the company itself admitted that it would resume transportation, which was suspended on May 7, only on May 15-16.

The scale of the attack on Colonial Pipeline was similar to the NotPetya incidents and the attack on Solar Winds.


DO I NEED TO PAY A REDEMPTION?

There is a stunning reality of extortion programs: 92% of organizations do not receive all their data, even if they have paid a ransom. Nevertheless, 32% of companies in 2021 are still willing to pay for it, hoping for a full recovery of their information. Due to this willingness of companies to comply with any conditions of criminal groups, only in the first three months of 2021 the amount of ransom increased significantly and now averages $ 220,000, while in the last three months of 2020 this figure was at $ 154,000. even after paying such crazy money, a third of organizations have not been able to recover more than half of their encrypted data.


It is also worth noting that the concept of blackmail program attack is evolving day by day, and now such attacks include payment requirements even without data encryption. Attackers demand payment in exchange for preventing leaks of stolen information on the Internet. But even after paying the extortionists in this case, the company has no guarantees and can not remain protected from the publication or sale of this data. Because does it make sense to rely on the honesty of fraudsters?


Threats from extortionist programs almost always have valuable consequences for business, including disruptions and theft of confidential data. So is it worth taking such a valuable risk?


IT IS TIME TO MOVE

Readiness for extortion programs has become so mandatory for all organizations that even executives and directors recognize it as part of their responsibility for the operation of the business. The company's team CrowdStrike - the developer of cybersecurity systems, which protects thousands of Amazon-sized companies from hackers, regularly assists organizations in both training and preventive protection, and in responding to attacks by extortionist programs. The company announces some of the practices it recommends in such a turbulent time from attacks.


1. Increasing the resilience to threats of applications with Internet access

It is not recommended to connect RDP directly to the Internet. Attackers use one-factor authentication and unregistered Internet applications. Hackers regularly target systems through Remote Desktop Protocol (RDP), which is available from the Internet.


It is recommended that you use a VPN with multifactor authentication and make sure that any CVEs associated with the VPN platform and the underlying authentication application have priority for fix. This principle should apply to all remote methods and Active Directory (AD) and Citrix Gateway.


2. Introduction and improvement of e-mail security

The victim organization is caught through a phishing letter - this is the most common tactic. Typically, these phishing emails contain a malicious link or URL that delivers data to the recipient's work platform.

Therefore, it is recommended that you implement an email security solution that filters URLs, as well as an isolated attachment software environment. In addition, organizations may prohibit users from receiving password-protected zip files, executable files, javascripts, or Windows Installer package files unless there is a legitimate business need to do so. Adding the "External] tag to non-organization emails and a warning message at the top of the email helps remind users to exercise caution when handling such emails.


Users should also have a documented process to report any emails they are unsure of. In addition, organizations should consider restricting users' access to personal email accounts.


3. Endpoint protection

During the lifecycle of an attack, which ends with the deployment of a ransomware, attackers often use a number of methods to exploit endpoints. These operating methods range from the use of bad AD configurations to the use of public exploits against unprotected systems or applications.

That is why we have to:

  • Provide full coverage of all endpoints in your network for endpoint security products and for the endpoint detection and protection platform (EDR).
  • Develop a vulnerability and patch management program.
  • Follow Active Directory security guidelines: avoid easy passwords with weak authentication methods; avoid having regular users with a domain with local administrator privileges and local administrator accounts with the same passwords for the entire enterprise; restrict data exchange between workstations; avoid sharing privileged credentials.


4. Offline backup

The only reliable way to save data during a ransomware attack is backups that are protected from those programs. When developing a stand-alone backup infrastructure, protected from extortionate programs, keep in mind that:

  • Standalone backups as well as indexes (which describe what data is contained) must be completely separated from the rest of the infrastructure.
  • Access to such networks must be controlled through strict access control lists (ACLs), and all authentications must be performed using multifactor authentication (MFA).
  • Administrators who have access to both stand-alone and network infrastructure should avoid re-using account passwords.
  • Cloud storage services with strict ACLs and rules can also serve as a stand-alone backup infrastructure.
  • Emergencies, such as a blackmail attack, should be the only case where a stand-alone infrastructure is allowed to connect to an existing network.


5. Restricting access to virtualization management infrastructure

New attacks use the ability to directly attack virtualized infrastructure. This approach allows you to use a hypervisor that deploys and stores virtual machines (VMDKs). As a result, endpoint security products installed on virtualized machines do not see malicious actions that target the hypervisor.


Many ESXi (VMware hypervisor) systems do not have a Secure Shell (SSH) protocol by default and are usually managed through vCenter. If SSH is disabled, previously stolen administrator credentials are used to enable SSH on all ESXi systems, so:

  • Restrict access to ESXi hosts to a small number of systems and make sure that these systems have proper endpoint monitoring.
  • Make sure SSH access is disabled, or make sure it is MFA protected.
  • Make sure that passwords are unique and secure for each ESXi host, as well as for the web client.


6. Implementation of the identification and access management program (IAM)

MAKE THE FIRST STEPS NOW

Any organization can fall victim to malicious extortion campaigns with seven-figure ransom demands, but much can be done to stop criminals. The damage that companies can suffer from one such attack can be ten times higher than the cost of its prevention and modern protection. Moreover, it is necessary to take into account the fact that every malicious action on the organization leads not only to material losses, but also damages the business reputation, brand and position of the company. Avoid such risks helps iIT Distribution.

iIT Distribution specializes in advanced information security solutions. We not only provide software and hardware, but also provide a full range of support and consulting services. We offer initial examination and assessment of the state of your information security of the enterprise, which is carried out by highly qualified specialists, selection of equipment and software and implementation of comprehensive cybersecurity solutions in the existing infrastructure, so you can be sure of your protection!

Try to contact with us through the feedback form on the website and get advice from professionals!

Back

Mobile Marketing
+
en_GBEnglish