News
14.03.2024
13:29
Postrelease: "Ecosystem of Excellence: From security innovations to sales success"
On March 7, iIT Distribution organized a partner event dedicated to the solutions of leading companies CrowdStrike, LogRhythm, Fastly, and SOCRadar, which cover a wide range of capabilities to meet the needs of customers in protecting information assets.
News
08.03.2024
17:21
CrowdStrike 2024 report: analysis of global cyber threats and defense strategies
The CrowdStrike 2024 report highlights a detailed analysis of the cyber threats of 2023, including fast and stealthy attacks that put organizations' data and infrastructure at risk. With intrusions up 60% and attacks on the rise, the importance of protecting identities and cloud environments is even more critical. The report provides key recommendations for strengthening cybersecurity, taking into account the latest trends and attack methods.
News
01.02.2024
14:44
Articles and reviews
24.01.2024
15:02
Hacking of Microsoft by Russian hackers and its significance in the field of cybersecurity
On Friday, January 19, Microsoft reported that a Russian-linked threat actor had stolen emails from members of its senior management team, as well as employees of its cybersecurity and legal departments. The details of this incident are covered by CRN with a comment from the CEO of CrowdStrike.
Articles and reviews
16.01.2024
15:53
Fastly
11.01.2024
iIT Distribution expands its portfolio by becoming an official Fastly distributor
iIT Distribution рада повідомити про підписання партнерської угоди з Fastly, відомою американською технологічною компанією, що спеціалізується на рішеннях у сфері хмарних обчислень (cloud computing) та доставки контенту через Інтернет.
CrowdStrike
06.12.2023
Securing Custom-Developed vs. Commercial Off-the-Shelf Software
Modern applications are designed to process, use and store vast amounts of sensitive data. As adversaries seek to infiltrate these applications, IT and security teams must ensure the software they use has the strongest possible security. The first step to implementing strong application security is understanding the type of application you need to protect.
Articles and reviews
29.11.2023
Ukrtelecom's Cybersecurity Transformation: Optimized SIEM Rules and Rapid Threat Detection Engineering
For Ukrtelecom, Ukraine’s premier fixed-line telephony operator and a leader among Internet providers, cybersecurity isn’t just nice to have—it’s an absolute necessity. With a vast network serving nearly 6.5 million fixed-line telephony subscribers and over 1.6 million high-speed Internet clients, protecting its services against a surging wave of cyber threats is critical. This case study explains why Ukrtelecom partnered with Picus Security to validate the effectiveness of defense mechanisms and enhance operational resilience.
Articles and reviews
22.11.2023
CVE-2023-46747: F5 BIG-IP - Вразливість неавторизованого віддаленого виконання коду
On October 26, 2023, F5 published an advisory about the AJP Smuggling vulnerability found in F5 BIG-IP products. CVE-2023-46747 is a critical vulnerability that allows unauthenticated attackers to execute arbitrary commands as root on vulnerable devices. The vulnerability has a CVSS rating of 9.8 (critical) and organizations are advised to patch affected F5 BIG-IP platforms.
News
14.11.2023
12:55
Articles and reviews
13.11.2023
Cloud storage security best practices
Cloud storage has brought numerous benefits to organizations, including easy accessibility, scalability, and cost-effectiveness. Public cloud providers continue to evolve the technology and add new features to improve efficiency and security. However, there are security concerns that you should be aware of and be prepared to deal with potential security issues in the cloud. Let's take a look at all the potential risks and methods to protect your data to prevent data loss in the cloud.
News
02.11.2023
11:25
The WALLIX Bastion hardware and software system is certified by the State Service of Special Communications and Information Protection of Ukraine
Experts of the State Service of Special Communications and Information Protection of Ukraine (Derzhspetszv'yazku) have certified the effectiveness of the WALLIX Bastion solution in the field of privileged access management (PAM), which confirms its compliance with information security requirements and standards.
Articles and reviews
18.10.2023
Cisco acquires Splunk, but how do you convince Splunk customers that Cisco has advantages
On September 21, Cisco announced its intention to buy Splunk for $28 billion in cash, its largest acquisition ever and fourth this year. This is a massive investment and win for Cisco from two perspectives: observability and security. Cisco’s full-stack observability platform could catapult into relevance against established competitors overnight. Similarly, on the security side, Cisco gains the leading security analytics platform on the market today with an incredibly loyal customer base.
Articles and reviews
26.09.2023
12:19
CrowdStrike provides 100% coverage according to the MITRE Engenuity ATT&CK Evaluations: Round 5
CrowdStrike has received the highest score in the last two consecutive MITRE Engenuity ATT&CK® Evaluations. The company achieved 100% protection, 100% visibility, and 100% detection analysis in the Enterprise Round 5 assessment - which equates to 100% breach prevention and stopping. CrowdStrike also achieved the highest detection rate in testing for Managed Security Service Providers.
Articles and reviews
22.09.2023
Top 20 Shocking Data Breach Statistics for 2023
As we head into the second half of 2023, it's useful to reflect on data breach statistics, as it sheds light on the evolution of the threat landscape: which industries are most affected, and what long-term consequences data breaches can have for individuals and businesses. To provide you with a sober look at the state of data security, data protection provider Lepide has compiled the main trends that will shape the cybersecurity landscape in the coming year.
News
05.09.2023
15:04
Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability
On June 20, 2023, Descope published research detailing how a combination of flaws in Azure Active Directory and poorly integrated third-party applications - called "nOAuth" - can lead to a full account takeover. nOAuth is the latest in a growing number of vulnerabilities and architectural flaws in Microsoft software and systems, such as Active Directory, that could put organizations at risk.
News
29.08.2023
18:42
News
21.08.2023
11:36
News
08.08.2023
18:09
Cybersecurity in Wartime: Challenges and Priorities for the State and Business
A one-day conference "IT Meets Tech: Cybersecurity", organized by Lviv IT Cluster with the support of the State Service for Special Communications and Information Protection of Ukraine and the USAID Project "Cybersecurity of Ukraine's Critical Infrastructure". Yuriy Gatupov, Director of iIT Distribution, became a part of this surprisingly important event and spoke at the panel discussion on "Key Lessons for Protecting Companies".
News
07.08.2023
15:26
Microsoft Security Risks. Considerations for organizations evaluating Microsoft Security
Microsoft Corporation is one of the leading software vendors in the world, and its products are used by millions of users, including for corporate purposes. As a software vendor, Microsoft is very popular and trusted, but is it able to provide a high level of cybersecurity that is truly free in today's environment?
Articles and reviews
31.07.2023
Effective communication: Email vs. Instant Messaging?
Can you imagine working without email? You’re not the only one who can’t: for decades, email has been an integral part of corporate communication. Even though several other online communication services have emerged since the first email was sent in the 70s, many studies have shown that email still is the most used communication channel.
News
21.07.2023
14:23
Infinidat Expands Support for Hybrid Cloud Storage Deployments with InfuzeOS Cloud Edition
Infinidat Ltd. announced 2 solutions that will catapult automated hybrid cloud storage and enterprise cyber storage resilience forward to modernize enterprise storage services: the expansion of the company’s support of hybrid cloud storage deployments with the launch of InfuzeOS Cloud Edition, and the addition of cyber resilience capabilities with InfiniSafe Cyber Detection for enterprise primary storage to better resist cyberattacks.
News
13.07.2023
16:02
Falcon Insight for ChromeOS: The Industry’s First Native XDR Offering for ChromeOS
In recent years, ChromeOS device usage among businesses has seen a significant uptick, particularly in its adoption across verticals, from schools to large enterprises. According to recent IDC research, 16% of North American organizations have ChromeOS devices and the percentage is only expected to increase. The success of ChromeOS devices like Chromebooks can be attributed to built-in security, simple management and premium performance.
Release
27.06.2023
News
31.05.2023
09:15
Opening new horizons: iIT Distribution is the official distributor of Gatewatcher
Gatewatcher is a cybersecurity software provider specializing in advanced breach detection. From now on, iIT Distribution will distribute Gatewatcher's advanced products and provide full support in the design and implementation of these solutions.
Articles and reviews
23.05.2023
Infinidat's storage solution pays for itself in 11 months and delivers a 162% ROI. Download the report from IDC to see for yourself.
Infinidat helps enterprises and service providers extend and scale their data-driven competitive advantage. Infinidat's software-defined storage architecture delivers microsecond latency, 100% availability, and scalability with a significantly lower total cost of ownership than competing storage technologies.
News
17.05.2023
12:37
News
11.05.2023
13:39
Another revolution in cybersecurity from CrowdStrike: top 5 important things to know about Managed XDR (MXDR)
CrowdStrike, a leading provider of cloud-based endpoint and workload security solutions, is creating new opportunities for partners with an expanded detection and response offering that builds on its popular Managed Detection and Response service, CrowdStrike CEO Daniel Bernard told CRN.
GTB technologies
09.05.2023
GTB Technologies is the best solution in the DLP industry
Data leakage prevention software, also known as DLP, refers to the practice of detecting and preventing information loss, namely, internal threats to leak or destroy critical data. Tech Times, an American publication that specializes in covering innovations and developments in technology, science, and healthcare and the challenges these areas face on a daily basis, has conducted its own analysis of the data leakage prevention (DLP) market and identified the top 5 products in this area. The top five is headed by GTB Technologies.
News
03.04.2023
12:05
CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers
On March 29, 2023, CrowdStrike observed unexpected malicious activity emanating from a legitimate, signed binary, 3CXDesktopApp — a softphone application from 3CX. The malicious activity includes beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and, in a small number of cases, hands-on-keyboard activity.
Articles and reviews
24.03.2023
Labyrinth Deception Platform v2.0.51: Release notes
A new version of Labyrinth, a highly effective solution for detecting and stopping hacker activity inside corporate networks, has recently been released. This update offers a number of new and improved features, as well as important fixes, which we will discuss in detail in this article.
Articles and reviews
22.03.2023
SIEM vs Log Management Systems: What you need to know before choosing
Both solutions are similar in that they are both designed to aggregate and correlate event data from multiple sources. SIEM solutions tend to be more advanced than a typical Log Management System; however, the functionality of Log Management Systems can vary considerably, and it’s important to note that “more advanced” does not necessarily mean better. Here's a look at the differences between the two technologies and how they can be extended to improve visibility and control over a complex IT environment.
Articles and reviews
14.03.2023
20:51
CrowdStrike Falcon Named the Winner of the 2022 AV-TEST Award for Best MacOS Security Product
AV-TEST Institute has recognized CrowdStrike Falcon® Pro for Mac as the best MacOS business security product for 2022 after rigorous testing and analysis. AV-TEST has finalized its 2022 MacOS security product evaluation for business users after a year-long series of tests in which Falcon Pro for Mac was the only security product to score a perfect 18.0 in three consecutive quarterly evaluations.
Articles and reviews
10.03.2023
20:59
CVE-2023-21716: Microsoft Word Remote Code Execution Exploit Explained
As part of Patch Tuesday, Microsoft has released patches for a critical remote code execution vulnerability found in the Office Word RTF parser. The vulnerability, CVE-2023-21716, has a CVSS rating of 9.8 (critical) and affects a wide range of versions of Microsoft Office, SharePoint, and 365 Apps. Users are advised to update their applications to the latest versions as soon as possible.
Release
03.03.2023
CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries
The CrowdStrike 2023 Global Threat Report, among the most trusted and comprehensive research on the modern threat landscape, explores the most significant security events and trends of the previous year, as well as the adversaries driving this activity.
News
24.02.2023
14:48
CrowdStrike Ranked #1 in the IDC Worldwide Endpoint Security Market Shares Report for Third Time in a Row
CrowdStrike maintains its leadership position in the endpoint security market. The company was ranked number one in IDC's 2021-2022 report and was recognized with awards in the Best Endpoint Detection and Response and Best Product Development categories by SE Labs. These honors confirm that CrowdStrike is an innovator and market leader in endpoint security.
Articles and reviews
21.02.2023
Picus Red Report 2023: The Top 10 Most Prevalent MITRE ATT&CK Techniques Used by Attackers
The Picus Labs team analyzed more than 500,000 malware samples to identify the 10 most common MITRE ATT&CK techniques used by attackers last year. Download a copy of the report and stay up to date with the latest cybersecurity trends.
Articles and reviews
14.02.2023
On leadership in the sphere of high-end unified storage: An exclusive interview with Phil Bullinger, CEO of Infinidat
StorageNewsletter.com, an online publication specializing in IT technologies, has recorded an exclusive interview with Infinidat CEO Phil Bullinger. During the conversation, Phil shared his impressions of the experience of cooperation with Infinidat before he became the company's CEO, told about the peculiarities of the company's product strategy and the benefits of the Infinidat partner program.
News
10.02.2023
12:35
Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes
PostgreSQL is a powerful, open-source relational database management system (RDBMS). Because of its robustness and scalability, PostgreSQL is used extensively in the cloud. Most public cloud providers including AWS, Azure and GCP provide database services to their customers based on PostgreSQL.
Release
26.01.2023
What's New in NAKIVO Backup & Replication v10.8: Release Overview
NAKIVO has recently released a new version of its Backup & Replication platform, version 10.8. NAKIVO Backup & Replication is a fast, comprehensive, reliable and affordable solution for protecting physical, virtual and cloud infrastructures, as well as work environments with strict data protection requirements. The solution allows you to seamlessly backup Windows or Linux Server, ensuring consistency of application and database data.
Articles and reviews
19.01.2023
How to detect and prevent phone hacking?
In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. While this technology offers great possibilities and convenience, it also can put your personal data at risk. Phones are lucrative targets of attacks because they hold so much valuable information stored in a single place, such as private or financial information. Luckily, there are key signs you can look out for — and steps you can take — to protect your device.
News
12.01.2023
14:19
CrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost Radar for Cyber Threat Intelligence
CrowdStrike has once again been recognized as a global leader in the Frost Radar Global Cyber Threat Intelligence Market, 2022 by Frost & Sullivan. Earlier this year, CrowdStrike was already named a leader in Quadrant Knowledge Solutions' SPARK for Digital Threat Intelligence Management matrix; and last year it was recognized as a leader in The Forrester Wave: External Threat Intelligence Services, for the first quarter of 2021.
Articles and reviews
04.01.2023
How to establish cyber strategy in the face of growing threats ?
As new security practices and measures are put in place, new work arounds will be created with threat actors constantly changing their tactics and looking for new routes to enter vulnerable systems. It can feel like an endless game, so how can businesses get ahead with cybersecurity ?
News
22.12.2022
12:56
New vendor in the iIT Distribution portfolio: Signing a partnership agreement with Threema
Starting now, we open the benefits of a fully secure corporate communication application from the Swiss developer Threema to Ukrainian organizations! Take the opportunity to purchase and test Threema solutions in Ukraine and get full support in designing and implementing custom solutions from our experts.
Articles and reviews
21.12.2022
How Breach and Attack Simulation Helps to Operationalize MITRE ATT&CK
MITRE ATT&CK is a globally accessible knowledge base of attacker tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a basis for developing specific models and methodologies to counter threats for companies in various sectors of the economy, as well as in the community of developers of cybersecurity products and services.
Articles and reviews
09.12.2022
DDoS Attack Prevention and DDoS Protection Best Practices
Easy to launch and often devastatingly effective, a distributed denial of service (DDoS) attack is one of the most common threats in today’s cybersecurity landscape. In simple terms, a DDoS attack seeks to disrupt a target’s connectivity or user services by flooding its network with an overwhelming volume of fraudulent traffic, typically through a botnet. The motivation behind the attack can vary from political protests, cyberwarfare, illicit competitive advantage, or extortion to undermining the victim’s security stack as a cover for data theft. In some cases, ransomware gangs even launch DDoS attacks against their victims to increase the pressure for payment. Knowing how to stop a DDoS attack is a critical priority for cybersecurity professionals.
Articles and reviews
21.11.2022
How Hackers Can Bypass Multi-Factor Authentication
Multi-factor authentication (MFA) is an authentication protocol that requires users to enter additional factors to log into their account. However, attackers have learned to overcome even these levels of protection. Learn how hackers can bypass multi-factor authentication and how to prevent it.
News
08.11.2022
16:49
CrowdStrike Achieves Red Hat OpenShift Certification: Streamlining Visibility and Automating Protection for OpenShift
As organizations expand their cloud-native initiatives and increase their use of containers and Kubernetes in production, they face challenges regarding container security, monitoring, data management and networking. To meet this growing need, we’re pleased to announce our certification of Red Hat OpenShift through the CrowdStrike Falcon platform — giving joint customers comprehensive breach protection for OpenShift nodes, workloads and containers.
News
03.11.2022
15:49
Infinidat Recognized as a Leader in Gartner Magic Quadrant for Primary Storage – 5th Year in a Row
Infinidat, a leading provider of enterprise storage solutions, today announced that the company has been named a Leader in the 2022 Gartner Magic Quadrant for Primary Storage, marking the 5th consecutive year that Gartner has recognized Infinidat’s in enterprise storage, including four years in the Primary Storage Magic Quadrant and one year in the Magic Quadrant for general-Purpose Disk Arrays.
Articles and reviews
31.10.2022
Urgent cyber defense measures in the context of international tensions and cyber warfare
Ever since the Russian military launched a full-scale invasion of Ukraine, we have anticipated possible hostile cyber campaigns targeting both the battlefield and NATO member states. Therefore, vigilance and prudence are key for both commercial organizations and government institutions. Ukrainian organizations and the world community must be ready to overcome the consequences of a potential cyber war, which may go beyond Ukrainian borders.
Release
19.10.2022
New version of NetBrain Release 11: the key to reducing the cost of NetOps
NetBrain Technologies - провідний постачальник рішень для автоматизації та візуалізації гібридних мереж, випустив Release 11, основну нову версію четвертого покоління своєї системи автоматизації діагностики проблем (Problem Diagnostic Automation system, PDAS), яка дозволяє клієнтам знизити вартість мережевих операцій шляхом використання новаторської технології NetBrain на основі намірів у всій системі та автоматичної генерації тисяч мережевих намірів, що охоплюють структуру всієї гібридної мережі, та можуть бути застосовані для запобігання збоїв у роботі мережі.
Articles and reviews
13.10.2022
With security revenue surging, CrowdStrike wants to be a broader enterprise IT player
The American edition of Protocol, which specializes in elucidating topics related to people, power and technology, has released a detailed review of CrowdStrike's leadership in the global corporate IT market. Get acquainted with the Ukrainian adaptation and find out what factors contribute to the powerful development of CrowdStrike.
News
05.10.2022
09:44
CrowdStrike Announced the Acquisition of Reposify to Bolster Visibility and Reduce Risk Exposure of External Assets
CrowdStrike, a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, announced it has agreed to acquire Reposify Ltd. Reposify provides an external attack surface management (EASM) platform that scans the internet for exposed assets of an organization to detect and eliminate risk from vulnerable and unknown assets before attackers can exploit them. With Reposify, CrowdStrike will provide a fundamentally differentiated EASM experience to customers as part of its world-renowned Threat Intelligence product suite, combining deep insights on endpoints and IT environments with internet scanning capabilities that deliver an adversarial-view of organizational risk across internal and external attack surfaces. CrowdStrike will also leverage Reposify’s capabilities to bolster its rapidly growing Security and IT Operations product suite.
Articles and reviews
22.09.2022
Kubernetes vs Docker: What’s the Difference?
Kubernetes and Docker are two of the most popular container orchestration and building platforms on the market. The Docker toolkit provides a means to create, share, and package containers on a single node to provide a faster and easier delivery process for developers. Kubernetes, on the other hand, is designed to eliminate manual scaling and deployment operations by running these packaged containers in a cluster.
Articles and reviews
15.09.2022
12:03
Infinidat Extends NVMe/TCP to VMware Environments
With the release of the new version of the InfiniBox software, Infinidat will be one of the few providers of an NVMe/TCP-certified enterprise storage solution for VMware. These new capabilities complement Infinidat's extensive integration with VMware, which improves the experience of enterprise users across the entire VMware portfolio.
Articles and reviews
14.09.2022
16:39
New features of InfiniBox from Infinidat: vVols replication for VMware environments
Infinidat, a leading provider of enterprise storage solutions, announced two new features to enhance today's VMware infrastructures: vVols replication with VMware Site Recovery Manager (SRM) integration and NVMe/TCP certification with vSphere ESXi. These new capabilities complement Infinidat's extensive integration with VMware, which improves the experience of enterprise users across VMware's software portfolio, including vSphere, vRealize and VMware Tanzu offerings. We suggest you familiarize yourself with the new capabilities of the Infinidat solution and understand in detail how vVols replication works.
Articles and reviews
01.09.2022
Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever
Recently CrowdStrike unveiled the next evolution of CrowdStrike’s industry-first IOAs: artificial intelligence (AI)-powered IOAs. Available to customers immediately, AI-powered IOAs are created by cloud-native machine learning (ML) models trained on the rich telemetry of the CrowdStrike Security Cloud — the engine powering the largest market share of deployed sensors in the enterprise security landscape — and expertise from our elite threat hunting teams to predict and proactively protect against emerging classes of threats. This milestone extends our approach of unifying AI and human expertise (as it have done with CrowdStrike Falcon OverWatch) to deliver unparalleled protection.
News
23.08.2022
13:14
The State Intelligence Service of Ukraine warns of a possible increase in cyberattacks by Russian hackers
The State Service for Special Communications and Information Protection of Ukraine urges to take care of security and provides recommendations on safe cyber behavior. On August 24, Ukrainians around the world will celebrate the 31st Independence Day of their country. This year, the holiday has a special meaning for all citizens, because every day we defend our statehood and sovereignty. The enemy, who is confidently repulsed by the Armed Forces, can activate his resources to cause additional destruction on an important day for us. Journalists and government officials advise to be more careful during the holidays: do not ignore air alarms, follow the news and be careful on the Internet.
News
10.08.2022
12:05
IIT DISTRIBUTION IS THE OFFICIAL DISTRIBUTOR OF WALLIX IN UKRAINE
iIT Distribution has signed a partnership agreement with the leading specialist in identity and access security - WALLIX! WALLIX is a developer of Privileged Access Management (PAM) solutions that offer a secure, simplified way to authorize and monitor privileged users for on-premises and cloud-based systems. The solution protects organizations from accidental or intentional abuse of privileged access to critical systems and resources.
Articles and reviews
01.08.2022
Tales from the Dark Web: How Tracking eCrime’s Underground Economy Improves Defenses
Research group CrowdStrike Intelligence has investigated how the frequency and sophistication of ransomware attacks have increased over the past year. It found that the number of ransomware-related data breaches increased by 82% in 2021 compared to 2020; in addition, 62% of attacks were found to be carried out using hands-on-keyboard techniques, again indicating that attackers continue to develop the skills necessary to bypass outdated security solutions and blackmail victims by threatening to perform a targeted data leak. We propose to find out what are the reasons for such an increase in cybercrime and how exactly hackers make money?
Articles and reviews
20.07.2022
The Rise of Botnet and DDoS Attacks
Distributed Denial of Service (DDoS) attacks have become an everyday or, some might argue, an hourly problem. Using a variety of methods, DDoS attacks are carried out and used by a variety of threat actors, from lone hackers, criminal groups and hacktivists to government actors.
Articles and reviews
11.07.2022
Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers
Attackers often exploit outdated protocols to infiltrate an organization's work environment. But, despite the already known vulnerabilities of such protocols as Windows NTLM, they are still widely used. One of the latest major variations of the NTLM relay attack is the combination of the PetitPotam vulnerability with AD-CS relay, which according to the research group CrowdStrike Identity Protection is highly popular. Although the latest Microsoft security update patch released on May 10, 2022 contained a fix for the aforementioned vulnerability, the problem has not completely disappeared. The update only changes the requirements: if earlier hacking was possible without authentication, now the data of any Active Directory account is required to launch the attack.
Articles and reviews
17.06.2022
What is Data Democratization?
An effective data democratization strategy will enable employees to ask data-related questions and thereby improve data literacy. If employees know exactly what data they need access to, it will be easier for security teams to define appropriate access control mechanisms. Data democratization is an ongoing process that can lead to a change in corporate culture within an organization. This is especially true for large organizations that collect and store huge amounts of information.
Articles and reviews
03.06.2022
Immutable Backups Explained: All You Need to Know to Secure Your Data
Most companies around the world use backup as a basic tool in the fight against ransomware and malware. Backups can help businesses remain operational and continue to serve customers during or immediately after an attack. They can also help you avoid having to pay a ransom to regain access to your data.
News
19.05.2022
20:33
Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack
Ukrainian organizations have repeatedly become victims of Russian-sponsored cyberattacks. In early 2022, a suite of malware called WhisperGate was deployed against a number of government agencies. On February 23 of the same year, a new Wiper-type threat called DriveSlayer loomed over Ukraine, masquerading as the PartyTicket ransomware. But such actions on the part of the attackers could not go unanswered.
News
06.05.2022
18:45
News
22.04.2022
16:01
Palo Alto Networks has disclosed vulnerabilities that could allow an attacker to disable the Cortex XDR platform
The problems became known from an enthusiast with the nickname mr.d0x, who reported that the Cortex XDR agent can bypass an attacker with elevated privileges. The researcher discovered that the agent could be disabled by a local attacker with administrative privileges by simply changing a registry key, leaving the endpoint vulnerable to attack. Moreover, the function of protection against unauthorized access does not prevent the use of this method.
News
20.04.2022
15:15
Advanced anti-DDoS solutions from A10 Networks are available for installation!
We are ready to provide our customers with trial licenses of the A10 Thunder TPS product with full functionality for the required period (including the pilot period, setup and launch periods). Please note that after signing the contract for the purchase of the solution, the time to replace the license will take a few minutes without causing the customer's system to stop.
News
15.04.2022
14:42
Inspur Information Rated Gartner Hype Cycle Sample Vendor of Cloud-Optimized Hardware for Second Year
Inspur, a leading provider of server equipment, storage systems and cloud computing services, has once again been selected by Gartner as a Sample Vendor of cloud-optimized hardware for its “Hype Cycle for Cloud Computing".
News
07.04.2022
16:16
FAST DELIVERY OF INFINIDAT AND INSPUR SOLUTIONS AVAILABLE NOW!
Just now, you can take advantage of fast delivery of multi-petabyte enterprise-class SZD solutions from INFINIDAT, as well as high-end server equipment from Inspur to order. We are ready to deliver the products you have chosen MAXIMUM 45 days after the application.
Articles and reviews
04.04.2022
Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities
On February 23, 2022, a series of devastating cyber attacks targeting Ukrainian organizations were carried out. According to industry reports, Go-based ransomware called PartyTicket (or HermeticRansom) was discovered in several organizations directly affected by the attack. Along with it, other malware families have been identified, including a Wiper-like program that CrowdStrike intelligence tracks as DriveSlayer (HermeticWiper).
Articles and reviews
26.03.2022
HOW NOT TO BECOME AN "UNWITTING ACCOMPLICE" OF RUSSIAN CYBER ATTACKS ON UKRAINIAN SYSTEMS (PART 3)
A large number of organizations around the world have services that facilitate attacks on Ukrainian digital infrastructure. And while these attacks are not intentional, as they are completely legitimate systems that have been turned into DDoS weapons, IT professionals should review their services now and take appropriate security measures using all of their security tools, not just security systems from DDoS.
Articles and reviews
22.03.2022
CrowdStrike Falcon protects against new Wiper malware used in cyberattacks against Ukraine
DriveSlayer is the second Wiper-type program to hit Ukraine in recent attacks using the WhisperGate malware. CrowdStrike Falcon customers can proactively monitor their environments using hunting queries to detect indicators of DriveSlayer presence.
Articles and reviews
20.03.2022
HOW TO NOT BECOME AN "UNCONSCIOUS ACCOMPLICE" TO RUSSIAN CYBER ATTACKS ON UKRAINIAN SYSTEMS (PART 2)
In the previous article of this series, we looked at intelligence from the A10 company, which allows us to understand the nature of recent cybercrimes funded by the Russian government, aimed at Ukrainian targets. A massive surge of attacks on Ukrainian state systems occurred on the very first day of the Russian-Ukrainian war.
Articles and reviews
16.03.2022
A10 NETWORKS SECURITY RESEARCH: HOW NOT TO BECOME AN "UNCONSCIOUS ACCOMPLICE" TO RUSSIAN CYBERATTACKS ON UKRAINIAN SYSTEMS
Russian terrorists pay special attention not only to territorial attacks, but also to destabilizing cyberattacks on Ukrainian systems. In this series of articles, learn about the features and details of new attacks discovered by the security research group of A10 Networks, and find out what actions should be taken to mitigate their consequences and how not to become an "unwitting accomplice" of the aggressor.
Articles and reviews
23.02.2022
Demo: CrowdStrike Falcon detects WhisperGate virus suite
Watch a video that demonstrates CrowdStrike Falcon's powerful capabilities in step-by-step detection of WhisperGate, and make sure that this platform leaves no chance for attackers to sneak even the most sophisticated viruses into your IT infrastructure and destroy your data.
Release
23.02.2022
Release
18.02.2022
From now on, iIT Distribution is an official distributor of Picus Security solutions!
Recently, iIT Distribution signed another partnership agreement with Picus, the world market leader in BAS solutions! iIT Distribution will distribute Picus products on the territories of Ukraine, Kazakhstan, Georgia and Uzbekistan, providing full technical support and design of the company's solutions.
CrowdStrike
17.02.2022
CrowdStrike Global Threat Report 2022!
Last year seemed to be difficult for the warriors of the cyber security front. With the societal changes brought on by the pandemic, hackers have had the opportunity to hone their skills and make their technology more adaptable, advanced, and insidious. As a result, the world was shaken by a number of high-profile cyber attacks.
Release
14.02.2022
Release
10.02.2022
Post-release: Webinar dedicated to the updated capabilities of Nakivo Backup & Replication v10.5
On February 8, Nakivo and iIT Distribution successfully held a co-hosted webinar on the new features of Nakivo Backup & Replication, a solution for backup, replication and disaster recovery for physical, virtual, cloud and SaaS environments.
Release
10.02.2022
CrowdStrike's latest Falcon XDR development is now available for users!
Based on advanced endpoint detection and response (EDR) technology and CrowdStrike Security Cloud capabilities, Falcon XDR offers users a unified, full-spectrum, next-generation Extended Detection and Response (XDR) function designed to help security teams stop breaches faster and more effectively.
Articles and reviews
02.02.2022
Familiarity with Security Operations Center (SOC) processes and the best recommendations for its effective operation from Lepide
SOC representatives must always be aware of the latest threat information. This is done by gathering information from news sources and reports. They must ensure that all systems are patched/updated in a timely manner and receive signature updates and vulnerability alerts.
News
27.01.2022
10:15
Cyberattack on Ukrainian state websites: what we know today
According to most official sources, the main purpose of the attack was not to steal data or disrupt government systems, but to sow chaos, panic and distrust. However, today there are additional facts that indicate that this event is much more serious than it might seem.
News
21.01.2022
13:18
Technical analysis of WhisperGate malicious downloader targeting Ukrainian organizations
On January 15, it became known that a set of malicious programs called WhisperGate was deployed against a number of Ukrainian organizations. According to multiple reports, the incident was caused by three separate components deployed by the same attacker: a malicious bootloader that corrupts detected local drives, a Discord bootloader, and a File Wiper.
Release
14.01.2022
CrowdStrike Services Releases Incident Response Tracker for DFIR (Digital Forensics and Incident Response) Specialists
The CrowdStrike Incident Response Tracker is a handy spreadsheet with tabs for documenting indicators of compromise, accounts that have been compromised, compromised systems, and a timeline of significant events.
News
12.01.2022
22:09
noPac Exploit: New Microsoft AD Vulnerability Can Completely Compromise a Domain in Seconds
Microsoft recently disclosed two critical Active Directory-related CVEs (CVE-2021-42278 and CVE-2021-42287) that, when used in combination by an attacker, could lead to elevation of privilege and, as a result, domain compromise.
Articles and reviews
06.01.2022
7 IT trends of 2022 that should be adopted
How can IT teams best plan their work in these volatile times? While the coming year is sure to throw up a few twists and turns, there are some trends you can bet on in 2022. Fasten your seat belts and discover the TOP 7 technological predictions from the Automox team.
News
30.12.2021
02:09
The leak of Pfizer's secret IP addresses is not uncommon. Protect your cloud data with proactive encryption
We often associate cyber breaches with corporate espionage or the activities of advanced groups. But are we right? This incident is an example of a fairly typical breach that is difficult to detect thanks to cloud technologies.
Articles and reviews
30.12.2021
6 scams to avoid this New Year's holiday: a selection of recommendations from Panda Security
Christmas and New Year holidays are a time of joy and goodness, but unfortunately not for cybercriminals. Many criminals use Christmas as a good opportunity to target even more victims, expanding their attack vectors.
Release
16.12.2021
Release
09.12.2021
Articles and reviews
08.12.2021
Release
30.11.2021
Aruba (HPE) is recognized as a leader in the Gartner Magic Quadrant for Enterprise Wired and WLAN Infrastructure 2021 report for the sixteenth year in a row!
Only two companies have been able to maintain a position in the leaders' quadrant for 16 consecutive years, and Aruba is among them. It is the only vendor that received the highest rating in three out of five use cases, according to the Critical Capabilities Report.
Release
23.11.2021
News
21.11.2021
18:53
The CrowdStrike Falcon solution received the highest rating of AAA according to the results of testing by the SE Labs organization
According to the Breach Response Test results presented in SE Labs' latest report, the CrowdStrike Falcon solution meets the highest AAA standard. This score clearly demonstrates Falcon's impeccable capabilities for automatic detection, defense against sophisticated attacks, and unrelenting effectiveness in neutralizing and blocking threats.
Release
15.11.2021
CrowdStrike business dinner: how was it?
Dominic Hausman, CrowdStrike's solution architect for the CEMEA market, delivered a speech at the business meeting. He shared with the audience the latest news, further benchmarks and development strategies of CrowdStrike aimed at implementing updated features and optimizing endpoint protection solutions.
Release
08.11.2021
News
05.11.2021
15:01
CrowdStrike has been recognized as a global leader in modern endpoint protection in the latest IDC MarketScape report!
In the IDC MarketScape report, analysts highlighted the advanced potential of the CrowdStrike Falcon platform due to its scalability, unique combination of industry-leading technologies, and human expertise in managed detection and response (MDR), threat detection, and proactive services.
Articles and reviews
03.11.2021
What is it the information security of the enterprise? What are the basic principles of data protection?
The scope of infosec is to create a set of business processes that will protect information assets, regardless of how that information is formatted, whether it is transmitted, processed or contained in storage.
News
02.11.2021
00:26
CrowdStrike and AWS Expand Integrations to Provide Customers Multi-layered Protection Against Ransomware Attacks and Sophisticated Threats
Нещодавно CrowdStrike оголосили про розширення технічної співпраці з AWS, націленої на надання своїм користувачам посиленого захисту від загроз у хмарі, робочих навантаженнях, ідентифікаційних даних та кінцевих точках
News
29.10.2021
15:41
Global Threat Report 2021 від CrowdStrike вже доступний українською мовою!
Ексклюзивно на вітчизняному ринку кібербезпеки компанія iITD пропонує україномовну версію Звіту про глобальні загрози 2021 – одного з найочікуваніших поглиблених і експертних аналізів основних тенденцій та напрямів кіберзагроз за весь останній рік!
News
25.10.2021
16:22
News
19.10.2021
10:58
CrowdStrike представляє перший у своєму роді XDR Module, що забезпечує виявлення інцидентів у реальному часі й автоматичне реагування по всьому стеку безпеки
Новітній модуль CrowdStrike розв'язує фундаментальні проблеми big data, які стосуються розширеного виявлення та реагуванні (XDR - Extended Detection and Response), забезпечуючи повну видимість і неперевершений захист в масштабах всього підприємства.
Release
19.10.2021
Infinidat – лідер серед первинних систем зберігання даних згідно зі звітом Gartner Magic Quadrant 2021
Тверда позиція Infinidat в Квадранті лідерів базується на власній фундаментальній ідеї — впроваджувати інновації та надавати рішення для зберігання даних з неперевершеним поєднанням 100% доступності, виключної продуктивності і мінімальної сукупної вартості володіння в масштабах декількох петабайт.
News
18.10.2021
15:53
Компанія iIT Distribution отримала статус офіційного дистриб'ютора A10 Networks
A10 Networks є провідним виробником галузі завдяки різноманіттю варіантів реалізації своїх рішень, надійній модульній операційній системі власної розробки ACOS, спеціалізованій елементній базі (FPGA) та кращим масогабаритним показникам обладнання.
Articles and reviews
11.10.2021
17:55
NetBrain
11.10.2021
iIT Distribution розширив арсенал своїх здобутків: фаховий сертифікат NetBrain Certified Platform Associate
Бренд-менеджер iIT Distribution Андрій Самойленко отримав сертифікат від NetBrain University у знак визнання успішного завершення курсу NetBrain Certified Platform Associate Exam for IE v8.0 та вдалої екзаменації.
News
05.10.2021
13:45
Release
30.09.2021
Захід, що розширює кордони знань і можливостей: Перший Щорічний Форум з Кібербезпеки CS² DAY 2021 справив справжній фурор на гостей!
24 вересня на інноваційному івент-майданчику PMHUB компанія iIT Distribution сумісно з CrowdStrike зібрали понад 250 гостей, а нашу онлайн-трансляцію передивилися понад 1000 глядачів!
Conference
23.09.2021
На завершення знайомства з партнерами заходу CS² DAY представляємо компанію-системного інтегратора – CS Consulting!
Спеціалісти CS Consulting допомагають клієнтам зміцнювати свої позиції безпеки, надаючи необхідні послуги та рішення для запобігання успіху потенційної кібератаки. Вони мають у своєму портфелі рішень лише перевірених, провідних світових постачальників кращих програмних забезпечень.
Conference
21.09.2021
Провідний фахівець Security-підрозділу компанії IBM Віталій Воропай завітає на CS² DAY в якості спікера!
Тема промови запрошеного експерта: «Зменшуємо хаос, збільшуємо можливості». Виступ буде вкрай інформативним та присвячуватиметься новітнім підходам до забезпечення надійного кіберзахисту для будь-яких IT-інфраструктур.
Conference
20.09.2021
Список спікерів Першого Щорічного Форуму з Кібербезпеки лише поповнюється: знайомтеся з Дмитром Петращуком від компанії IT-Specialist
В рамках промови буде викладено власний практичний досвід використання платформи безпеки CrowdStrike для протистояння викликам, які постають перед SOC. Технології та методи нападу і захисту в кіберсвіті постійно розвиваються. В результаті чого, вимоги до компетенцій аналітиків SOC та функціональних можливостей систем захисту невпинно зростають.
Conference
20.09.2021
На CS² DAY виступлять представники державного сектору: Віктор Жора та Олександр Галущенко!
На захід завітають заступник голови Державної служби спеціального зв’язку та захисту інформації України Віктор Жора та провідний інспектор Національного координаційного центру безпеки при Раді національної безпеки і оборони України Олександр Галущенко.
Conference
17.09.2021
Зустрічайте наступного запрошеного спікера довгоочікуваного CS² DAY – Олексія Зайончковського від компанії Netwave!
Олексій Зайончковський розповість про місце й значення платформи Crowdstrike Falcon в типовій архітектурі інформаційної безпеки організацій, а також про виконання нею типових задач та розподіл обов’язків між ролями ІТ і ІБ.
Conference
16.09.2021
Представляємо другого спікера CS² DAY: Михайло Кропива – InfoSec Director топової української IT-компанії SoftServe!
Михайло Кропива розповість історію пошуку та впровадження компанією SoftServe найкращого рішення для кібербезпеки класу EDR (Endpoint Detection and Response). Якщо вам критично важливо зберегти конфіденційність корпоративних даних і забезпечити безперебійну роботу серверів вашої компанії, вам, вочевидь, буде надзвичайно корисно послухати про шлях ефективного переосмислення системи кіберзахисту SoftServe.
Conference
16.09.2021
Познайомтеся ближче з компанією-головним партнером CS² DAY та першим спікером заходу – Майклом Чальватцісом!
CrowdStrike – співорганізатор Першого Щорічного Форуму з Кібербезпеки CS² DAY 2021, ця компанія є унікальною своїми високоефективними підходами до створення продуктів для забезпечення ІТ-захисту. Від імені CrowdStrike на заході виступить Майкл Чальватціс - Віцепрезидент регіону Центральної та Східної Європи.
Release
08.09.2021
iIT Distribution та CrowdStrike запрошують на CS² DAY – Перший Щорічний Форум з Кібербезпеки!
Тепер українські фахівці матимуть можливість перейти на новий рівень знань в галузі кібербезпеки всього за один день! Адже СS² DAY – захід, присвячений ексклюзивному обміну досвідом впровадження сучасних моделей захисту від нових вразливостей та атак. Це по-справжньому визначна подія для тих, хто прагне підвищити рівень безпеки своєї IT-інфраструктури.
News
03.09.2021
14:11
Conference
30.08.2021
Модель Zero Trust і система DLP: що нового розповіли наші представники та партнери на міжнародній конференції «Digital Change & Customers — Цифрові зміни та клієнтський сервіс»
На заході пролунали змістовні та по-своєму новаторські виступи від представниці iIT Distribution, pre-sales менеджерки Іни Лазаренко та нашого партнера, pre-sales менеджера GTB Technologies Олександра Погребного. Вони під новим кутом поглянули на шляхи ефективного впровадження моделі Zero Trust і системи DLP, які є чи не першочерговими «маст хев» рішеннями для оптимізації кіберсередовища компаній, особливо тих, що перебувають у тотальній залежності від цілісності й конфіденційності своїх баз даних.
Conference
05.08.2021
We invite you to the international conference "Digital Change & Customers”
To assist the financial sector in solving cybersecurity problems, the International Financial Club «БАНКИРЪ» gathers representatives of the financial, public and insurance sectors, as well as the best experts of the technology industry within the international conference "Digital Change & Customers " on August 12 at the Kyiv convention center INVERIA. Participants will meet within an offline event to discuss new emerging problems of fintech and find the best ways to solve them.
Articles and reviews
28.07.2021
IT'S TIME TO STOP THE FEAR OF NEW TECHNOLOGIES: HOW CAN YOU CHANGE YOUR USUAL SOLUTION PROVIDERS AND IMPLEMENT MORE ADVANCED TECHNOLOGIES INTO YOUR INFRASTRUCTURE?
The basis of any company's strategy that's going to function for decades (at least) is expansion. Business develops: the branches is appearing, the network is expanding, the number of employees, including those who work remotely, is increasing, and operational processes become more complex. All that make the IT-infrastructure of this business change, modernize and expand in direct proportion, as well as requires the implementation of new systems in addition to the existing ones.
Articles and reviews
20.07.2021
Achieve petabyte-scale data protection with lightning-fast recovery!
Is your organization prepared for a ransomware attack? How about one that targets your backup? InfiniGuard protects your backup with snapshots that cannot be deleted, encrypted, or changed and begins the recovery process near-instantaneously.
News
12.07.2021
14:13
Infinidat — is the best choice for Gartner Peer Insights 2021 customers!
The company becomes the owner of this award based on customer reviews and evaluations for the third year in a row! This recognition is especially important for the manufacturer Infinidat, because the choice is made directly by users. Companies recognize Infinidat for its reliability, performance, scalability, unique architecture and best support.
News
06.07.2021
11:27
CrowdStrike took first place in the market share of Modern Endpoint Security 2020!
CrowdStrike ranked first in revenue in 2020 in the global corporate endpoint security market according to IDC Worldwide Corporate Endpoint Security Market Shares. The report is another confirmation of CrowdStrike's market leadership and demonstrates the proven effectiveness of the CrowdStrike Falcon platform.
Release
22.06.2021
The announcement of a new solution for storing InfiniBox SSA corporate class data from infinidat!
InfiniBox SSA is the first system to use 100% solid state technology for permanent storage. The combination of Infinidat Neural Cache's patented machine learning algorithm and increased DRAM cache takes the revolutionary performance of the InfiniBox array to a new level with a capacity of up to 546 TB and an IOPS of up to 1,5 million.
Conference
10.06.2021
GTB technologies
01.06.2021
GTB Technologies comprehensive DLP solution received a certificate from the State Service for Special Communications and Information Protection of Ukraine
The results of the expert assessment confirm that the information security system GTB DLP Suite meets high standards of technical information protection, the requirements of the current legal framework for security and can be used to create comprehensive information security systems for various purposes in public and commercial organizations.
Articles and reviews
31.05.2021
News
18.05.2021
14:04
News
11.05.2021
11:25
CrowdStrike has become the leader in the Gartner Magic Quadrant 2021 for the second time among endpoint protection platforms!
Gartner has recognized CrowdStrike as a leader in endpoint security (EPP) security vendors. CrowdStrike became the only company that not only maintained its leading position, but also for the second time in a row took the best position among Visionaries in the Magic Quadrant EPP!
Release
28.04.2021
News
26.04.2021
10:00
News
12.04.2021
10:00
iIT Distribution expands its portfolio with networking solutions from Aruba Networks
We provide supplies for the entire product line of the vendor, which is annually ranked among the leaders in the wired and wireless access networks market according to IDC MarketScape and Gartner Magic Quadrant (the leader of the quadrant for 15 years in a row!).
News
12.04.2021
09:00
Articles and reviews
05.04.2021
News
30.03.2021
09:54
Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!
CrowdStrike continues a series of good news and receives the highest scores on 11 criteria, as well as in the market presence category in the report The Forrester Wave: Managed Detection And Response (MDR) for the first quarter of 2021, which makes it a leader in its class.
News
24.03.2021
11:22
Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!
CrowdStrike earned the highest possible score in 17 criteria and first place in the Market Presence category, showing us that more customers trust CrowdStrike than any other vendor.
Articles and reviews
15.03.2021
New Forrester study shows all the economic benefits of using the Falcon Complete!
A recent large-scale study conducted by Forrester Consulting on behalf of CrowdStrike, entitled “The overall economic impact of using CrowdStrike Falcon Complete” revealed all the benefits of CrowdStrike’s approach to controlled detection and response to
Conference
02.03.2021
iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!
On the third of March Kyiv will host the main event of the domestic ICT market! This annual unique industry event promises to fill visitors with a unique atmosphere and a powerful flow of information. IIT Distribution, as the official partner of the event, together with NetBrain and CrowdStrike, will share their knowledge in the field of information security.
Release
18.02.2021
Conference
08.02.2021
International Conference "Go Digital - 2021: acceleration and migration. Money goes online".
IIT Distribution invites banking, insurance, non-banking financial and MFI companies to the conference. As a partner of the event, we speak on the topic: "Review of network documentation and automation from NetBrain."
News
25.01.2021
11:52
Crowdstrike's response to recent supply chain attacks
You've probably heard the latest news that attackers have used SolarWinds software to gain access to the corporate networks of many large institutions around the world. An important signal is that after this hack, SolarWinds became a CrowdStrike client. This is a special message for our partners, designed to keep you informed.
News
08.10.2020
10:27
Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"
October 6, 2020 The Third Annual International Forum "Cyber Security - Protect Business, Protect the State" was held in Kyiv, in which iIT Distribution acted as a partner and sponsor. We thank the organizers of the CIS Events Group forum and the Chamber of Commerce and Industry of Ukraine. We believe that the support of such state structures as the National Security and Defense Council of Ukraine, the State Service for Special Communications and Information Protection of Ukraine and the Cyberpolice shows that cybersecurity is finally being brought to the level of state strategy.
News
29.09.2020
22:49
IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020
Ukraine is among the top 10 countries that have often been the target of significant and systemic cyberattacks over the past 14 years (Specops, 2020). That is why the joint efforts of the government and business aimed at strengthening cybersecurity measures in Ukraine are extremely important for our country. The Intelligent IT Distribution (iITD) team is proud to be a partner of such an important event for Ukraine as the Third International Forum "Cybersecurity - Protect Business, Protect the State", organized by the Chamber of Commerce and Industry of Ukraine. The speakers of the conference are leading Ukrainian and global cybersecurity experts: Gennady Chizhikov, President of the Chamber of Commerce and Industry of Ukraine, Oleksiy Danilov, Secretary of the National Security and Defense Council of Ukraine, Mykhailo Shmelyov, Microsoft Director of Technology Strategies and Policies for Central and Eastern Europe Olaf Schultz, Nokia's Director of EU Cooperation and Development Strategy, Germany, Alexander Timoshik, Head of Information Security, Raiffeizen Bank Aval, and others. The program of the forum consists of a plenary session and 5 interdisciplinary sections: Section 1: Safe online environment - coronavirus experience. Section 2: Cybersecurity is not an application, but a product built into each system since its inception. Section 3: Current issues of information protection in the banking and financial sector. Section 4: Technology and Law: Adjusted Steps to Digital Transformation. Section 5: Education as a basis for the formation of a new culture of behavior in cyberspace. Please pay special attention to the report "Hidden threat - the most unexpected leaks" (speaker - Alexander Pogrebny, Solution Manager of GTB Technologies). To comply with restrictions and recommendations regarding the fight against Covid-19, the event will take place in a chamber format in the conference hall "Colosseum" of the Chamber of Commerce and Industry of Ukraine at Velyka Zhytomyrska Street, 33, Kyiv. Everyone has the opportunity to take part in the online format of the meeting.
IT infrastructure management
24.09.2020
08:32
iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine
IIT Distribution has signed a distribution agreement with NetBrain Technologies, a market automation market leader. Under this agreement, the iIT Distribution team provides distribution and promotion of solutions in Ukraine. That is, now you have the opportunity to purchase NetBrain Technologies products in Ukraine and receive professional support for their design and implementation. NetBrain Technologies was founded in 2004. The technology platform is designed so that engineers have full visibility of hybrid environments, as well as the ability to easily automate them for working IT processes. Currently, 2,300+ leading corporations use NetBrain solutions to automate network documentation, fast troubleshooting, and enhanced network security with seamless integration with partner organizations' ecosystems. NetBrain's head office is located in the United States (Burlington, Massachusetts) and also operates regional offices in China, Germany, the United Kingdom and Germany. Nowadays, infrastructure management is a much more difficult task than ever before. NetBrain provides the ability to track the full picture of multi-infrastructure networks with many providers. That is, you get a functional and comprehensive analysis of physical, virtual and software-defined networks of the organization. This allows you to have full visibility of processes in the network. The importance of network automation is especially important in the remote work of a large number of corporate employees. The ability to automate processes and manage changes in networks, allows companies to work more effectively with employees regardless of their location. We invite you to send a request for a demo version of NetBrain Technologies solutions, and order product testing!
Conference
28.08.2020
Fal.Con 2020 by CrowdStrike
CrowdStrike, a leader in cybersecurity, invites you to Fal.Con 2020. By joining this virtual event, you can choose from 70 training sessions that cover the most relevant topics related to data protection. IIT Distribution is the exclusive distributor of CrowdStrike products in Ukraine. Fal.Con 2020 is an event that everyone who is interested in cybersecurity should attend. Participants will be able to choose panel presentations and training modules, which will help develop effective strategies for their companies, increase preparedness to counter cyber threats and effectively prepare their organization to operate in today's threat landscape.
Articles and reviews
25.08.2020
Conference
25.08.2020
Cossack Labs invites you to visit NONAMECON
The Cossack Labs team has been supporting the NoNameCon conference for several years in a row, which usually takes place in the spring in Kyiv. This year, thanks to the COVID-19 pandemic, the event will take place exclusively in virtual format. Topics of reports and discussions at the conference are divided into several different areas of cybersecurity: September 3 - red (offensive security), September 4 - blue (defensive security). The first day is scheduled for a video interview with the legendary Bruce Schneier, and the second for reports on post-quantum cryptography, browser and anti-virus behavior, bot creation and protection. The conference will also feature workshops and debates, a traditional hacking quiz, and online entertainment, including an online afterparty.
22.07.2020
Conference
21.07.2020
News
18.06.2020
09:47
News
11.06.2020
14:51
Articles and reviews
20.05.2020
PandaLabs Report: Understanding Threats 2020
PandaLabs anti-virus lab, Panda Security, recorded and analyzed 14.9 million malicious events in 2019, stopping 7.9 million potentially unwanted programs (PNPs), as well as 76,000 exploit warnings designed to exploit vulnerabilities in applications and networks. or equipment to describe in the report the main IS threats and trends. In 2020, protection of end devices from known threats will no longer be enough. The IT environment needs to be protected from unknown threats as well, because they try to stay in the shadows. To do this, IT providers need to review their IS strategies. New threats require the transition from single-tech IS to multi-level solutions that use (among other functions) behavioral monitoring to address persistent threats of increased complexity (APT), fileless attacks, and other malicious activity.
News
05.05.2020
08:58
Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems
Encryption of confidential and personal data is determined by the regulations (GDPR, HIPAA, PCI DSS) and the best practices of the industry. However, the integration of cryptography in the modern application is often a difficult task that has a limited impact on the increase in safety and many architectural compromises. ACRA goal - change this situation.
Articles and reviews
13.04.2020
Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.
Lepide Remote Worker Monitoring Pack is an easy-to-deploy and lightweight security platform that offers immediate protection for businesses during unforeseen periods of remote work. Data Security Support - Control how data and resources are used to ensure data security and avoid data leakage. Early detection of risks - monitor important tasks, detect abnormal user behavior and take immediate action to stop threats. Increase productivity - Identify those employees who see work from home as an excuse to do nothing and get them back in shape.
Promotion
12.04.2020
Ensuring cybersecurity for remote users
In this situation, cloud solutions from Panda Security are best suited for this. These solutions are easy to implement and maintain - for their work can be installed without a separate infrastructure. Panda Security allows you to ensure the security of all end devices located both in the office and outside it in the shortest possible time. Three reasons to use Panda Fusion 360: 1. The solution is cloud-based and does not require time and resources to deploy in the corporate network. The cloud management console allows in a few hours to get the visibility of all processes on all end devices that are
Promotion
08.04.2020
Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months
The large number of remote devices that have access to the company's internal resources has multiplied the complexity of information security. In this situation, it has become almost impossible to secure your infrastructure by relying only on technologies such as antivirus and firewalls. Traditional perimeter protection has become essentially ineffective and things have emerged that are almost impossible to prevent. For example, if an attacker manages to obtain or guess a user's credentials and impersonate one of your employees, there is a good chance that no prevention technology will notice. These are the so-called silent failures. Perimeter protection has failed, and you have an evil you don't know about. And according to statistics, most organizations do not know about it for another 100 days or more.
News
07.04.2020
10:48
Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months
IIT Distribution, together with CrowdStrike, announces the launch of the campaign: "CrowdStrike: remote work and IT security in times of crisis - a shortened licensing program for 3-6 months." Many companies have sent their employees home and are trying their best to provide them with everything they need for remote work. Maintaining security is a serious risk for many organizations as cybercriminals develop and use new tactics and techniques to take advantage of this wave of confusion and chaos. Against this background, CrowdStrike has adjusted the validity of licenses for new customers in accordance with the current situation. CrowdStrike's "Paid Pilot Offer" is an offer for companies whose employees are in their "home office" and who need to quickly organize the protection of IT infrastructure. Falcon Prevent, Falcon Insight or Falcon Enterprise licenses can be purchased for 3 to 6 months instead of the usual 12 months
Release
23.03.2020
IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine
IIT Distribution has signed a distribution agreement with RedSeal Networks, Inc. - developer of software solutions in the field of information security, designed for visualization and analysis of network security risks. Under this agreement, the iIT Distribution team provides distribution and promotion of solutions in Ukraine. RedSeal is an enterprise information security risk management platform that allows you to automate the process of collecting configurations of network devices (routers, switches, load balancers) and information security tools (firewalls, attack prevention systems). The configuration is obtained by connecting to devices or reading configuration files from a given repository (CMDB, file resources). Based on the received information, RedSeal automatically builds an up-to-date map of the network.
Release
23.03.2020
IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine
Many organizations experience the influence of internal threats only after data leakage, when it is too late to do something about this. The only way to ensure that this will not happen - take a proactive and comprehensive data audit strategy. Lepideauditor allows administrators to add one or more Active Directory objects, Exchange Server, SharePoint Server, SQL Server, file servers, Office365 and Dropbox. The solution provides the visibility of these components across the entire enterprise using a single powerful and easy-to-use console, where all the changes made are graphically displayed and it is possible to generate more than 270 different reports.
News
16.03.2020
10:35
iIT Distribution starts distribution of Crowdstrike solutions in Ukraine
IIT Distribution announces cooperation with CrowdStrike - a world leader in the field of protection of terminal devices, and the beginning of deliveries of solutions to the Ukrainian market. CrowdStrike's main product is the Falcon platform, which is the industry's first cloud platform to protect end devices. Falcon is based on artificial intelligence (AI) and combines technology, intelligence and experience into one simple solution that reliably stops any threats.
Conference
19.02.2020
On the 20-th of February in Kiev Annual Conference Ciso DX Day 2020 will be held
Why is everything so much easier with Advance Analitycs? Yuri Gatupov, CEO of iIT Distribution, will demonstrate a new approach to detecting, preventing and investigating IS incidents with Exabeam Advanced Analytics. We fully agree with Gartner experts that Exabeam Advanced Analytics is one of the best solutions for building an SOC.
18.02.2020
IIT Distribution has received the status of a distributor of Instana solutions in Ukraine
IIT Distribution has signed a distribution agreement with Instana, a leading developer of full stack applications for monitoring applications and infrastructure for microservices, containers, Kubernetes, and OpenShift.