iIT Distribution is the official distributor of Lookout
We provide solutions for mobile device management and their protection from the world leader in mobile threat management.
iIT Distribution expands its portfolio with networking solutions from Aruba Networks
We provide supplies for the entire product line of the vendor, which is annually ranked among the leaders in the wired and wireless access networks market according to IDC MarketScape and Gartner Magic Quadrant (the leader of the quadrant for 15 years in a row!).
Articles and reviews
Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!
CrowdStrike continues a series of good news and receives the highest scores on 11 criteria, as well as in the market presence category in the report The Forrester Wave: Managed Detection And Response (MDR) for the first quarter of 2021, which makes it a leader in its class.
Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!
CrowdStrike earned the highest possible score in 17 criteria and first place in the Market Presence category, showing us that more customers trust CrowdStrike than any other vendor.
Articles and reviews
New Forrester study shows all the economic benefits of using the Falcon Complete!
A recent large-scale study conducted by Forrester Consulting on behalf of CrowdStrike, entitled “The overall economic impact of using CrowdStrike Falcon Complete” revealed all the benefits of CrowdStrike’s approach to controlled detection and response to
iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!
On the third of March Kyiv will host the main event of the domestic ICT market! This annual unique industry event promises to fill visitors with a unique atmosphere and a powerful flow of information. IIT Distribution, as the official partner of the event, together with NetBrain and CrowdStrike, will share their knowledge in the field of information security.
International Conference "Go Digital - 2021: acceleration and migration. Money goes online".
IIT Distribution invites banking, insurance, non-banking financial and MFI companies to the conference. As a partner of the event, we speak on the topic: "Review of network documentation and automation from NetBrain."
Crowdstrike's response to recent supply chain attacks
You've probably heard the latest news that attackers have used SolarWinds software to gain access to the corporate networks of many large institutions around the world. An important signal is that after this hack, SolarWinds became a CrowdStrike client. This is a special message for our partners, designed to keep you informed.
Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"
October 6, 2020 The Third Annual International Forum "Cyber Security - Protect Business, Protect the State" was held in Kyiv, in which iIT Distribution acted as a partner and sponsor. We thank the organizers of the CIS Events Group forum and the Chamber of Commerce and Industry of Ukraine. We believe that the support of such state structures as the National Security and Defense Council of Ukraine, the State Service for Special Communications and Information Protection of Ukraine and the Cyberpolice shows that cybersecurity is finally being brought to the level of state strategy.
IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020
Ukraine is among the top 10 countries that have often been the target of significant and systemic cyberattacks over the past 14 years (Specops, 2020). That is why the joint efforts of the government and business aimed at strengthening cybersecurity measures in Ukraine are extremely important for our country. The Intelligent IT Distribution (iITD) team is proud to be a partner of such an important event for Ukraine as the Third International Forum "Cybersecurity - Protect Business, Protect the State", organized by the Chamber of Commerce and Industry of Ukraine. The speakers of the conference are leading Ukrainian and global cybersecurity experts: Gennady Chizhikov, President of the Chamber of Commerce and Industry of Ukraine, Oleksiy Danilov, Secretary of the National Security and Defense Council of Ukraine, Mykhailo Shmelyov, Microsoft Director of Technology Strategies and Policies for Central and Eastern Europe Olaf Schultz, Nokia's Director of EU Cooperation and Development Strategy, Germany, Alexander Timoshik, Head of Information Security, Raiffeizen Bank Aval, and others. The program of the forum consists of a plenary session and 5 interdisciplinary sections: Section 1: Safe online environment - coronavirus experience. Section 2: Cybersecurity is not an application, but a product built into each system since its inception. Section 3: Current issues of information protection in the banking and financial sector. Section 4: Technology and Law: Adjusted Steps to Digital Transformation. Section 5: Education as a basis for the formation of a new culture of behavior in cyberspace. Please pay special attention to the report "Hidden threat - the most unexpected leaks" (speaker - Alexander Pogrebny, Solution Manager of GTB Technologies). To comply with restrictions and recommendations regarding the fight against Covid-19, the event will take place in a chamber format in the conference hall "Colosseum" of the Chamber of Commerce and Industry of Ukraine at Velyka Zhytomyrska Street, 33, Kyiv. Everyone has the opportunity to take part in the online format of the meeting.
IT infrastructure management
iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine
IIT Distribution has signed a distribution agreement with NetBrain Technologies, a market automation market leader. Under this agreement, the iIT Distribution team provides distribution and promotion of solutions in Ukraine. That is, now you have the opportunity to purchase NetBrain Technologies products in Ukraine and receive professional support for their design and implementation. NetBrain Technologies was founded in 2004. The technology platform is designed so that engineers have full visibility of hybrid environments, as well as the ability to easily automate them for working IT processes. Currently, 2,300+ leading corporations use NetBrain solutions to automate network documentation, fast troubleshooting, and enhanced network security with seamless integration with partner organizations' ecosystems. NetBrain's head office is located in the United States (Burlington, Massachusetts) and also operates regional offices in China, Germany, the United Kingdom and Germany. Nowadays, infrastructure management is a much more difficult task than ever before. NetBrain provides the ability to track the full picture of multi-infrastructure networks with many providers. That is, you get a functional and comprehensive analysis of physical, virtual and software-defined networks of the organization. This allows you to have full visibility of processes in the network. The importance of network automation is especially important in the remote work of a large number of corporate employees. The ability to automate processes and manage changes in networks, allows companies to work more effectively with employees regardless of their location. We invite you to send a request for a demo version of NetBrain Technologies solutions, and order product testing!
Fal.Con 2020 by CrowdStrike
CrowdStrike, a leader in cybersecurity, invites you to Fal.Con 2020. By joining this virtual event, you can choose from 70 training sessions that cover the most relevant topics related to data protection. IIT Distribution is the exclusive distributor of CrowdStrike products in Ukraine. Fal.Con 2020 is an event that everyone who is interested in cybersecurity should attend. Participants will be able to choose panel presentations and training modules, which will help develop effective strategies for their companies, increase preparedness to counter cyber threats and effectively prepare their organization to operate in today's threat landscape.
Articles and reviews
Cossack Labs invites you to visit NONAMECON
The Cossack Labs team has been supporting the NoNameCon conference for several years in a row, which usually takes place in the spring in Kyiv. This year, thanks to the COVID-19 pandemic, the event will take place exclusively in virtual format. Topics of reports and discussions at the conference are divided into several different areas of cybersecurity: September 3 - red (offensive security), September 4 - blue (defensive security). The first day is scheduled for a video interview with the legendary Bruce Schneier, and the second for reports on post-quantum cryptography, browser and anti-virus behavior, bot creation and protection. The conference will also feature workshops and debates, a traditional hacking quiz, and online entertainment, including an online afterparty.
Articles and reviews
PandaLabs Report: Understanding Threats 2020
PandaLabs anti-virus lab, Panda Security, recorded and analyzed 14.9 million malicious events in 2019, stopping 7.9 million potentially unwanted programs (PNPs), as well as 76,000 exploit warnings designed to exploit vulnerabilities in applications and networks. or equipment to describe in the report the main IS threats and trends. In 2020, protection of end devices from known threats will no longer be enough. The IT environment needs to be protected from unknown threats as well, because they try to stay in the shadows. To do this, IT providers need to review their IS strategies. New threats require the transition from single-tech IS to multi-level solutions that use (among other functions) behavioral monitoring to address persistent threats of increased complexity (APT), fileless attacks, and other malicious activity.
Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems
Encryption of confidential and personal data is determined by the regulations (GDPR, HIPAA, PCI DSS) and the best practices of the industry. However, the integration of cryptography in the modern application is often a difficult task that has a limited impact on the increase in safety and many architectural compromises. ACRA goal - change this situation.
Articles and reviews
Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.
Lepide Remote Worker Monitoring Pack is an easy-to-deploy and lightweight security platform that offers immediate protection for businesses during unforeseen periods of remote work. Data Security Support - Control how data and resources are used to ensure data security and avoid data leakage. Early detection of risks - monitor important tasks, detect abnormal user behavior and take immediate action to stop threats. Increase productivity - Identify those employees who see work from home as an excuse to do nothing and get them back in shape.
Ensuring cybersecurity for remote users
In this situation, cloud solutions from Panda Security are best suited for this. These solutions are easy to implement and maintain - for their work can be installed without a separate infrastructure. Panda Security allows you to ensure the security of all end devices located both in the office and outside it in the shortest possible time. Three reasons to use Panda Fusion 360: 1. The solution is cloud-based and does not require time and resources to deploy in the corporate network. The cloud management console allows in a few hours to get the visibility of all processes on all end devices that are
Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months
The large number of remote devices that have access to the company's internal resources has multiplied the complexity of information security. In this situation, it has become almost impossible to secure your infrastructure by relying only on technologies such as antivirus and firewalls. Traditional perimeter protection has become essentially ineffective and things have emerged that are almost impossible to prevent. For example, if an attacker manages to obtain or guess a user's credentials and impersonate one of your employees, there is a good chance that no prevention technology will notice. These are the so-called silent failures. Perimeter protection has failed, and you have an evil you don't know about. And according to statistics, most organizations do not know about it for another 100 days or more.
Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months
IIT Distribution, together with CrowdStrike, announces the launch of the campaign: "CrowdStrike: remote work and IT security in times of crisis - a shortened licensing program for 3-6 months." Many companies have sent their employees home and are trying their best to provide them with everything they need for remote work. Maintaining security is a serious risk for many organizations as cybercriminals develop and use new tactics and techniques to take advantage of this wave of confusion and chaos. Against this background, CrowdStrike has adjusted the validity of licenses for new customers in accordance with the current situation. CrowdStrike's "Paid Pilot Offer" is an offer for companies whose employees are in their "home office" and who need to quickly organize the protection of IT infrastructure. Falcon Prevent, Falcon Insight or Falcon Enterprise licenses can be purchased for 3 to 6 months instead of the usual 12 months
IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine
IIT Distribution has signed a distribution agreement with RedSeal Networks, Inc. - developer of software solutions in the field of information security, designed for visualization and analysis of network security risks. Under this agreement, the iIT Distribution team provides distribution and promotion of solutions in Ukraine. RedSeal is an enterprise information security risk management platform that allows you to automate the process of collecting configurations of network devices (routers, switches, load balancers) and information security tools (firewalls, attack prevention systems). The configuration is obtained by connecting to devices or reading configuration files from a given repository (CMDB, file resources). Based on the received information, RedSeal automatically builds an up-to-date map of the network.
IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine
Many organizations experience the influence of internal threats only after data leakage, when it is too late to do something about this. The only way to ensure that this will not happen - take a proactive and comprehensive data audit strategy. Lepideauditor allows administrators to add one or more Active Directory objects, Exchange Server, SharePoint Server, SQL Server, file servers, Office365 and Dropbox. The solution provides the visibility of these components across the entire enterprise using a single powerful and easy-to-use console, where all the changes made are graphically displayed and it is possible to generate more than 270 different reports.
iIT Distribution starts distribution of Crowdstrike solutions in Ukraine
IIT Distribution announces cooperation with CrowdStrike - a world leader in the field of protection of terminal devices, and the beginning of deliveries of solutions to the Ukrainian market. CrowdStrike's main product is the Falcon platform, which is the industry's first cloud platform to protect end devices. Falcon is based on artificial intelligence (AI) and combines technology, intelligence and experience into one simple solution that reliably stops any threats.
On the 20-th of February in Kiev Annual Conference Ciso DX Day 2020 will be held
Why is everything so much easier with Advance Analitycs? Yuri Gatupov, CEO of iIT Distribution, will demonstrate a new approach to detecting, preventing and investigating IS incidents with Exabeam Advanced Analytics. We fully agree with Gartner experts that Exabeam Advanced Analytics is one of the best solutions for building an SOC.
IIT Distribution has received the status of a distributor of Instana solutions in Ukraine
IIT Distribution has signed a distribution agreement with Instana, a leading developer of full stack applications for monitoring applications and infrastructure for microservices, containers, Kubernetes, and OpenShift.