fbpx

Representative offices 

Request callback
btn

Webinar series: transition to the Zero Trust model

Webinar

22.04.2021

11:00 - 12:00 (GMT +3)

on-line

Registration

iIT Distribution, ambassador of unique cyber security solutions in Ukraine, together with the company Safe-T - developer of a solution for secure and simplified access to applications and files based on architecture ZTNA, are invited to a series of webinars to get acquainted with the vendor's product portfolio.


The Safe-T platform is designed to implement centralized secure user access to the corporate network in a "zero trust" paradigm for hyperconvergent environments. Safe-T components control access to local and cloud resources and services, public cloud services, devices, and files. Safe-T has no restrictions on scaling and works without agents, although it also supports working with them.


WHY IS THE ZERO TRUST MODEL IMPORTANT?

Today, the protection of confidential data has become important and complex. Modern scanning and hacking tools prove that attackers target any organization, regardless of its size and vertical, which makes every company a target. Therefore, ensuring completely secure access to files and applications is a key element in creating a reliable and sustainable security strategy. Cybersecurity experts and CTOs from around the world are unanimous in advocating the need to evolve secure access based on the Zero Trust architecture in today's realities. In order to facilitate your transition to the concept of zero trust and make it as convenient and efficient as possible, Safe-T develops advanced access protection solutions.


WHY SHOULD YOU TAKE PART IN A WEBINAR SERIES?

Traditional principles of protection of the perimeter of the internal network are no longer enough. Remote work has become a significant driver of this, which is increasingly becoming the norm, rather than something temporary. Now the boundaries are blurred, so the security department has a task to protect organizations without a clear perimeter. The zero-confidence model is designed to solve this problem. IIT Distribution helps businesses rethink perimeter security, as well as build a ZTA architecture based on the best solutions from market leaders. That is why we have created a series of training webinars that together would move to a new level of protection!


The first webinar will be dedicated to the solution for managing external access to ZoneZero SDP services.

Safe-T ZONEZERO SDP — безпечний доступ до додатків

Safe-T's ZoneZero SDP solution is changing the way organizations manage external access to their services. This product is part of the ZoneZero Perimeter Access Orchestration platform, provides centralized management of all secure access technologies, and helps organizations achieve Zero Trust Network Access (ZTNA).


The ZoneZero SDP solution provides secure and transparent access for all types of objects (users, applications and connected devices) to any internal application, service and data (HTTP / S, SMTP, SFTP, SSH, APIs, RDP and WebDAV). ZoneZero SDP uses Safe-T's patented reverse access technology, which allows you not to open input ports in the organization's firewall.

Agenda

  • An overview of Safe-T's key solution for secure remote access to SDP applications
  • Review of the patented Safe-T reverse access technology
  • Demonstration of the solution
  • The most interesting use-cases
  • Question and answer session

Speakers

Sasha Lishinevski

Safe-T Engineer

Inna Lazarenko

iITD Sales Engineer

Lepide Data Security Platform 21.1 Live Demonstration

Webinar

18.03.2021

16:00 - 17:00 (GMT +2)

on-line

Registration

Lepide has unveiled updated Lepide Data Security Platform 21.1 on March 8!
This data protection solution helps organizations meet the challenges of external threats, data loss, and compliance with a variety of information security standards.

Developers completely redesigned the platform to make it the most scalable platform on the market. In addition to the implementation of enterprise scalability, the Lepide Data Security Platform 21.1 enables security teams to report on open AWS S3 open buckets, report on permissions in OneDrive and automatically discover open shares.

As an official partner of Lepide iITD invites you to a live demo of the product, where you can get acquainted with all the key new features of the platform and its use.


Webinar language: English.

Key questions:

  • Where is my most sensitive data and why is it sensitive?
  • Who has access to this data and am I at risk of privilege abuse?
  • What changes are being made to data that could lead to a breach or incident?
  • What security states and changes pose a risk to my data?

Annual international grand forum "BIT & BIS-2021" in Kyiv!

Conference

03.03.2021

09:30 - 18:00 (GMT +2)

Депо Конференц Хол, вул. Антоновича, 50

Registration

On March 3, Kiev will host the main event of the domestic ICT market - the International Grand Forum "BIT & BIS-2021"!!

This annual unique industry event promises visitors a unique atmosphere and an impressive informational charge.

Partners and experts of the event will share the latest in the IT industry, their personal experience and advice.

IIT Distribution, as the official partner of the event, together with NetBrain and CrowdStrike, will share their knowledge in the field of information security.

The main problem for cybersecurity departments in most companies remains the lack of the necessary level of automation and visual control over the cyber environment. The lack of an automated mechanism for collecting data, contextual understanding of security incidents and visual control over hidden potential threats in the network significantly increases the risk of an organization becoming a victim of a cyber attack and reduces its confidence in its own security.

That is why Sergey Aleinikov, Head of Technical Department of iIT Distribution, will tell you about CrowdStrike – Identity Threat Detection. A solution for tracking the authentication process, questionable user behavior and detecting threats in real time! Identity Threat Detection correlates events around the user, their activity and the device to improve response to a threat, thereby reducing the need for complex, time-consuming analyzes by SOC employees, and shortening the response time to events.

Expect our second talk from Andrievsky, network engineer at iIT Distribution, who will tell you how to get rid of heavy manual work and save time and money with the Network Automation from NetBrain.

In addition, we invite guests to visit our stand, where you can chat with our experts, finally live!

Organizations are constantly adding new solutions and connected devices to their networks. Traffic is increasing, and there is no understanding of the maximum capabilities of many products and ways to provide protection. During the pandemic and the transition to remote work, new devices were added spontaneously, and there was not enough time to fully study the functionality. It is time to structure the work of IT resources and build a unified and functional information security system! How exactly? We are ready to answer all your questions!

From you only presence and good mood, from "BIT & BIS-2021" and iIT Distribution - everything else!

Participation is free by prior registration.

Thematic sections:

  • modern cloud solutions and services
  • data storage and business intelligence
  • contact center solutions to business problems
  • Internet of things and smart business solutions
  • cybercrime, hacker attacks and information security
  • construction and modernization of data centers
  • installation and maintenance of cable communication networks
  • IP-based corporate communications

Identity Threat Detection is an important aspect of cyber security transformation

How To Get Rid Of Hard Handwork And Save Time And Money Together With NetBrain Network Automation

Speakers:

Sergey Aleinikov

Sergey Aleinikov

Head of iIT Distribution Technical Department

IDENTITY THREAT DETECTION - AN IMPORTANT ASPECT OF CYBER SECURITY TRANSFORMATION

Taras Andrievsky

Taras Andrievsky

Мережевий інженер iIT Distribution

NETWORK AUTOMATION - HOW TO GET RID OF HARD WORK AND SAVE TIME AND MONEY

How to clean up confidential and personal data with Microsoft Teams victorian?

Webinar

25.02.2021

12:00 - 12:30 (GMT +2)

on-line

Registration

We invite you to a free webinar from Lepide!

Since the beginning of the pandemic, all video conferencing and collaboration services have faced an explosive growth in the number of users. For example, the number of Microsoft Teams users has increased 5 times since January last year and reached 75 million people. This platform has been a lifeline for many remote working groups around the world. However, as with any other collaboration platform, the massive demand for MS Teams has clearly demonstrated security issues that no one has thought about before.

Security vulnerabilities that could be used to steal user credentials and other sensitive information need to be identified and addressed in advance.

That's what the company Lepide - a global provider of solutions for auditing and data protection, organized a webinar on data protection when using MS Teams.

Lepide develops data protection solutions that help ensure the safety and confidentiality of enterprise-wide data, regardless of size, sector, or budget.

QUESTIONS TO BE CONSIDERED AT THE WEBINAR:

  • what is Teams is and how it works;
  • what happens in your organization's IT environment when using Teams;
  • and most importantly how to protect your data.

International Conference "Go Digital - 2021: acceleration and migration. Money goes online"

Conference

11.02.2021

09:00 - 18:00 (GMT +3)

on-line

Registration

We invite you to take part in the International Conference "Go Digital - 2021: Acceleration & Migration. Money goes online!

An event designed to highlight the problems of information infrastructures in banks and financial companies as a complex multifaceted ecosystem that needs enhanced protection against advanced threats.


iIT Distribution, as one of the leading independent companies in the field of CyberSecurity, which helps banks and non-bank financial companies to solve problems in the field of information security, prevent persistent attacks, comply with regulatory requirements, act as an official partner of the event and share their cybersecurity knowledge with participants.

Issues to be considered at the conference:

  • Smart automation. Electronic document management and optimization of business processes, based on CRM, ERP, BPM, BPA technologies for financial and credit institutions.
  • Migration of banks and non-bank financial institutions in the Cloud. Big Data, IoT. Opportunities for mobile and internet banking.
  • Introduction of tools for remote identification of clients and remote drawing up of contracts. Data management.

Topic of the report:

"Review of network documentation and automation from NetBrain"

Taras Andrievsky will talk about network documentation and automation from NetBrain. This technology platform is designed so that engineers have full visibility of hybrid environments, as well as the ability to easily automate them for working IT processes. NetBrain allows you to get a functional and comprehensive analysis of physical, virtual and software-defined networks of the organization.
As an official distributor and partner of NetBrain, we will deeply explore the issue of automation and response to events with NetBrain, as well as the key capabilities and tools of the platform.

Speaker

Taras Andrievsky

Taras Andrievsky

Network Engineer iIT Distribution

VIDEO OF THE WEBINAR

Third Annual International Forum "Cybersecurity - Protect Business, Protect the State"

Conference

The Intelligent IT Distribution (iITD) team decided to become a partner of such an important event for Ukraine as the Third International Forum "Cybersecurity - Protect Business, Protect the Country", organized by the Ukrainian Chamber of Commerce and Industry.

The speakers of the conference are leading Ukrainian and world experts in the cybersecurity industry: Gennady Chizhikov, President of the Ukrainian Chamber of Commerce and Industry, Oleksiy Danilov, Secretary of the National Security and Defense Council of Ukraine, Mikhail Shmelev, Microsoft Director for Technology Strategies and Policies for the MultiCountry region of Central and Eastern Europe , Dr. Olaf Schultz, Nokia Director for Cooperation with the EU and Development Strategy, Germany, Alexander Timoshik, Head of Information Security Department, Raiffeizen Bank Aval, etc.

The forum program consists of a plenary session and 5 interdisciplinary sections:

Section 1: Safe Online Environment - Coronavirus Experience.

Section 2: Cybersecurity is not an application, but a product built into every system since its inception.

Section 3: Topical issues of information security in the banking and financial spheres.

Section 4: Technologies and Law: Corrected Terms of Digital Transformation.

Section 5: Awareness as the basis for the formation of a new culture of behavior in cyberspace.

We recommend that you pay special attention to the report "The hidden threat - the most unexpected points of information leakage" (speaker - Alexander Pogrebnoy, Solution Manager, GTB Technologies).

To comply with the restrictions and recommendations for countering Covid-19, the event will be held in a chamber format in the Colosseum conference hall of the Ukrainian Chamber of Commerce and Industry at Bolshaya Zhitomirskaya Street33, Kiev. For everyone, there is an opportunity to take part in an online meeting format. 

Register to participate online

Speaker

Alex Pogrebny

Solution Manager GTB Technologies

International Conference "Online Banking - Time of Innovation!"

Conference

23.07.2020

12:00 - 12:20 (GMT +3)

on-line

Registration

For IT specialists and IT security specialists!

We invite you to the International Conference: "Online Banking - Time of Innovation! Live DEMO".

The topic of our report: "Crowdstrike is all the advantages of a cloud platform to overcome modern challenges in the field of protection of workstations and servers."

Crowdstrike is the most efficient solution in the world to protect the final devices from all types of cybergroms. Unconditional leader according to Gartner and Forrester. Main advantages of solutions: Using Big Data and Machine Learning mechanisms, the complete visibility of all processes occurring on end devices, protection against any species of attacks, including APT, Fileless, Zero-Day, etc. Modules Solution: NGAV (Next Generation AntiVirus), EDR (Endpoint Detection and Response), Threat Intelligence (Collecting Cyber Study Data), Threat Hunting (Projective Threat Search), Sandbox (Sandbox), IT Hygiene (Inventory used on computers and patch Management), Vulnerability Assessment (vulnerabilities scanner), Mobile Protection.

Issues to be considered at the conference:

  • Cybersecurity in the new environment. Practical cases and recommendations

Speaker

Gatupov Yuriy Serhiyovych

Gatupov Yuriy Serhiyovych

Director of iIT Distribution

Webinar video

Infinidat Active-Active. Metrocluster and integration with VMware

Webinar

14.05.2020

16:00 - 17:00 (GMT +3)

on-line

Registration

For IT specialists and IT security specialists!

We invite you to the webinar: “Infinidat Active-Active. Metrocluster and integration with VMware”.

The INFINIDAT team has done all this work with a single goal - to reduce customer infrastructure costs and focus on innovation, growth and competitive advantage.

Infinidat offers proven enterprise solutions for data storage and protection, business continuity and the creation of independent cloud storage. All of our solutions are based on the same basic technology that provides high availability and performance and minimal total cost of ownership - all on the scale of petabytes of data.

VIDEO OF THE WEBINAR

Questions to consider at the webinar:

  • Discuss the work of Infinidat in the VMware ecosystem.
  • Talk about current business requirements, Infinidat's approach to ensuring 100% availability
  • Integration of Infinidat and VMware, Active-Active solution and vSphere Metro Storage Cluster.

Speaker

Vasil Kostryukov,

Vasil Kostryukov,

INFINIDAT Technical Director

Labyrinth Deception Platform is a reliable tool for detecting threats in networks with blurred perimeter protection. LIVE DEMO.

Webinar

22.04.2020

11:00 - 12:00 (GMT +3)

on-line

Registration

For IT specialists and IT security specialists!

We invite you to the webinar: “Labyrinth Deception Platform is a reliable tool for detecting threats in networks with blurred perimeter protection. LIVE DEMO”.

The Labyrinth solution was developed by a team of experienced researchers and engineers in the field of cybersecurity. Based on unique threat detection technologies, this Deception class solution gives attackers the illusion of real vulnerabilities in the IT infrastructure. Based on so-called Points, intelligent simulation hosts, each component of the imaginary environment reproduces the services and content of real network segments. Labyrinth provokes attackers to attack by tracking and studying their actions to improve security. The functionality of the product provides the most powerful capabilities for detecting targeted attacks (APT), botnets, "zero-day" attacks and insiders.

VIDEO OF THE WEBINAR

Questions to consider at the webinar:

  • Creating a Labyrinth MAP.
  • Detection of malicious activity in the corporate network.
  • Analysis of behavior and techniques of attackers.
  • Incident Response and integration with third-party products.

Speaker

SERGEY ALEINIKOV

SERGEY ALEINIKOV

HEAD OF TECHNICAL DEPARTMENT, IIT DISTRIBUTION

Instana: Manage the performance of containerized applications in real time. Live DEMO.

Webinar

10.04.2020

11:00 - 12:00 (GMT +3)

on-line

Registration

For IT specialists and IT security specialists!

We invite you to the webinar: “Instana: Manage the performance of containerized applications in real time. Live DEMO”.

Instana is a fully automated application performance monitoring (APM) solution that makes it easy to visualize and manage the performance of your business applications and services. This is the only APM solution built specifically for cloud-native microservice architectures. Instana uses automation and AI to instantly deliver important DevOps information. For developers, Instana AutoTrace technology automatically captures the context, displaying all your programs and microservices without the need for constant additional configuration.

VIDEO OF THE WEBINAR

Questions to consider at the webinar:

  • Tracked distributed queries
  • Comparison of all dependencies between services
  • Profiling of productive processes

Speaker

Yuriy Oleynyk

Yuriy Oleynyk

Product Manager Instana

en_GBEnglish
ukUkrainian ru_RURussian en_GBEnglish