Representative offices: 

Request callback
btn

Latest news

gazeta

News

14.03.2024

13:29

Постреліз: Підсумки заходу

Postrelease: "Ecosystem of Excellence: From security innovations to sales success"

On March 7, iIT Distribution organized a partner event dedicated to the solutions of leading companies CrowdStrike, LogRhythm, Fastly, and SOCRadar, which cover a wide range of capabilities to meet the needs of customers in protecting information assets.

gazeta

News

08.03.2024

17:21

CrowdStrike 2024 report: analysis of global cyber threats and defense strategies

CrowdStrike 2024 report: analysis of global cyber threats and defense strategies

The CrowdStrike 2024 report highlights a detailed analysis of the cyber threats of 2023, including fast and stealthy attacks that put organizations' data and infrastructure at risk. With intrusions up 60% and attacks on the rise, the importance of protecting identities and cloud environments is even more critical. The report provides key recommendations for strengthening cybersecurity, taking into account the latest trends and attack methods.

gazeta

News

01.02.2024

14:44

Powerful and flexible network visibility with Niagara Networks

Powerful and flexible network visibility with Niagara Networks

The iIT Distribution team is proud to announce the signing of a distribution agreement with Niagara Networks, a leading company in the field of network solutions.

gazeta

Articles and reviews

24.01.2024

15:02

Hacking of Microsoft by Russian hackers and its significance in the field of cybersecurity

Hacking of Microsoft by Russian hackers and its significance in the field of cybersecurity

On Friday, January 19, Microsoft reported that a Russian-linked threat actor had stolen emails from members of its senior management team, as well as employees of its cybersecurity and legal departments. The details of this incident are covered by CRN with a comment from the CEO of CrowdStrike.

gazeta

Articles and reviews

16.01.2024

15:53

CrowdStrike's undisputed leadership and Gartner recognition

CrowdStrike's undisputed leadership and Gartner recognition

CrowdStrike is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.

eyes

Fastly

11.01.2024

iIT Distribution expands its portfolio by becoming an official Fastly distributor

iIT Distribution expands its portfolio by becoming an official Fastly distributor

iIT Distribution рада повідомити про підписання партнерської угоди з Fastly, відомою американською технологічною компанією, що спеціалізується на рішеннях у сфері хмарних обчислень (cloud computing) та доставки контенту через Інтернет.

eyes

Release

25.12.2023

WHAT'S NEW WITH NAKIVO BACKUP & REPLICATION V10.11 BETA

WHAT'S NEW WITH NAKIVO BACKUP & REPLICATION V10.11 BETA

Improved IT monitoring. Extended features! Join the NAKIVO Backup & Replication v10.11 Beta test and get a $30 Amazon eGift Card by completing the requirements of the beta test program.

eyes

CrowdStrike

06.12.2023

Securing Custom-Developed vs. Commercial Off-the-Shelf Software

Securing Custom-Developed vs. Commercial Off-the-Shelf Software

Modern applications are designed to process, use and store vast amounts of sensitive data. As adversaries seek to infiltrate these applications, IT and security teams must ensure the software they use has the strongest possible security. The first step to implementing strong application security is understanding the type of application you need to protect.

eyes

Articles and reviews

29.11.2023

Ukrtelecom's Cybersecurity Transformation: Optimized SIEM Rules and Rapid Threat Detection Engineering

Ukrtelecom's Cybersecurity Transformation: Optimized SIEM Rules and Rapid Threat Detection Engineering

For Ukrtelecom, Ukraine’s premier fixed-line telephony operator and a leader among Internet providers, cybersecurity isn’t just nice to have—it’s an absolute necessity. With a vast network serving nearly 6.5 million fixed-line telephony subscribers and over 1.6 million high-speed Internet clients, protecting its services against a surging wave of cyber threats is critical. This case study explains why Ukrtelecom partnered with Picus Security to validate the effectiveness of defense mechanisms and enhance operational resilience.

eyes

Articles and reviews

22.11.2023

CVE-2023-46747: F5 BIG-IP - Вразливість неавторизованого віддаленого виконання коду

CVE-2023-46747: F5 BIG-IP - Вразливість неавторизованого віддаленого виконання коду

On October 26, 2023, F5 published an advisory about the AJP Smuggling vulnerability found in F5 BIG-IP products. CVE-2023-46747 is a critical vulnerability that allows unauthenticated attackers to execute arbitrary commands as root on vulnerable devices. The vulnerability has a CVSS rating of 9.8 (critical) and organizations are advised to patch affected F5 BIG-IP platforms.

gazeta

News

14.11.2023

12:55

Advanced threat intelligence: iIT Distribution announces partnership with SOCRadar vendor

Advanced threat intelligence: iIT Distribution announces partnership with SOCRadar vendor

iIT Distribution has signed a distribution agreement with SOCRadar, a provider of a comprehensive solution for Extended Threat Intelligence (XTI).

eyes

Articles and reviews

13.11.2023

Cloud storage security best practices

Cloud storage security best practices

Cloud storage has brought numerous benefits to organizations, including easy accessibility, scalability, and cost-effectiveness. Public cloud providers continue to evolve the technology and add new features to improve efficiency and security. However, there are security concerns that you should be aware of and be prepared to deal with potential security issues in the cloud. Let's take a look at all the potential risks and methods to protect your data to prevent data loss in the cloud.

gazeta

News

02.11.2023

11:25

The WALLIX Bastion hardware and software system is certified by the State Service of Special Communications and Information Protection of Ukraine

The WALLIX Bastion hardware and software system is certified by the State Service of Special Communications and Information Protection of Ukraine

Experts of the State Service of Special Communications and Information Protection of Ukraine (Derzhspetszv'yazku) have certified the effectiveness of the WALLIX Bastion solution in the field of privileged access management (PAM), which confirms its compliance with information security requirements and standards.

eyes

Articles and reviews

18.10.2023

Cisco acquires Splunk, but how do you convince Splunk customers that Cisco has advantages

Cisco acquires Splunk, but how do you convince Splunk customers that Cisco has advantages

On September 21, Cisco announced its intention to buy Splunk for $28 billion in cash, its largest acquisition ever and fourth this year. This is a massive investment and win for Cisco from two perspectives: observability and security. Cisco’s full-stack observability platform could catapult into relevance against established competitors overnight. Similarly, on the security side, Cisco gains the leading security analytics platform on the market today with an incredibly loyal customer base.

gazeta

Articles and reviews

26.09.2023

12:19

CrowdStrike provides 100% coverage according to the MITRE Engenuity ATT&CK Evaluations: Round 5

CrowdStrike provides 100% coverage according to the MITRE Engenuity ATT&CK Evaluations: Round 5

CrowdStrike has received the highest score in the last two consecutive MITRE Engenuity ATT&CK® Evaluations. The company achieved 100% protection, 100% visibility, and 100% detection analysis in the Enterprise Round 5 assessment - which equates to 100% breach prevention and stopping. CrowdStrike also achieved the highest detection rate in testing for Managed Security Service Providers.

eyes

Articles and reviews

22.09.2023

Top 20 Shocking Data Breach Statistics for 2023

Top 20 Shocking Data Breach Statistics for 2023

As we head into the second half of 2023, it's useful to reflect on data breach statistics, as it sheds light on the evolution of the threat landscape: which industries are most affected, and what long-term consequences data breaches can have for individuals and businesses. To provide you with a sober look at the state of data security, data protection provider Lepide has compiled the main trends that will shape the cybersecurity landscape in the coming year.

gazeta

News

05.09.2023

15:04

Зловмисники можуть

Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability

On June 20, 2023, Descope published research detailing how a combination of flaws in Azure Active Directory and poorly integrated third-party applications - called "nOAuth" - can lead to a full account takeover. nOAuth is the latest in a growing number of vulnerabilities and architectural flaws in Microsoft software and systems, such as Active Directory, that could put organizations at risk.

gazeta

News

29.08.2023

18:42

Instant replication with NAKIVO Backup & Replication v10.10 Beta

Instant replication with NAKIVO Backup & Replication v10.10 Beta

Virtual machine recovery just got faster with NAKIVO! Join the NAKIVO Backup & Replication v10.10 Beta test and get a $75 Amazon eGift Card by completing the beta program requirements.

eyes

Articles and reviews

25.08.2023

How lifecell Leverages The Picus Complete Security Validation Platform to Safeguard Ukraine's Telecommunications Landscape

How lifecell Leverages The Picus Complete Security Validation Platform to Safeguard Ukraine's Telecommunications Landscape

Learn how telecommunications operator lifecell has strengthened its security system using the Picus Complete Security Validation Platform.

gazeta

News

21.08.2023

11:36

iIT Distribution is the official distributor of LogRhythm!

iIT Distribution is the official distributor of LogRhythm!

The iIT Distribution team has signed a distribution contract with LogRhythm!

gazeta

News

08.08.2023

18:09

Cybersecurity in Wartime: Challenges and Priorities for the State and Business

Cybersecurity in Wartime: Challenges and Priorities for the State and Business

A one-day conference "IT Meets Tech: Cybersecurity", organized by Lviv IT Cluster with the support of the State Service for Special Communications and Information Protection of Ukraine and the USAID Project "Cybersecurity of Ukraine's Critical Infrastructure". Yuriy Gatupov, Director of iIT Distribution, became a part of this surprisingly important event and spoke at the panel discussion on "Key Lessons for Protecting Companies".

gazeta

News

07.08.2023

15:26

Microsoft Security Risks. Considerations for organizations evaluating Microsoft Security

Microsoft Security Risks. Considerations for organizations evaluating Microsoft Security

Microsoft Corporation is one of the leading software vendors in the world, and its products are used by millions of users, including for corporate purposes. As a software vendor, Microsoft is very popular and trusted, but is it able to provide a high level of cybersecurity that is truly free in today's environment?

eyes

Articles and reviews

31.07.2023

Effective communication: Email vs. Instant Messaging?

Effective communication: Email vs. Instant Messaging?

Can you imagine working without email? You’re not the only one who can’t: for decades, email has been an integral part of corporate communication. Even though several other online communication services have emerged since the first email was sent in the 70s, many studies have shown that email still is the most used communication channel.

gazeta

News

21.07.2023

14:23

Infinidat Expands Support for Hybrid Cloud Storage Deployments with InfuzeOS Cloud Edition

Infinidat Expands Support for Hybrid Cloud Storage Deployments with InfuzeOS Cloud Edition

Infinidat Ltd. announced 2 solutions that will catapult automated hybrid cloud storage and enterprise cyber storage resilience forward to modernize enterprise storage services: the expansion of the company’s support of hybrid cloud storage deployments with the launch of InfuzeOS Cloud Edition, and the addition of cyber resilience capabilities with InfiniSafe Cyber Detection for enterprise primary storage to better resist cyberattacks.

gazeta

News

13.07.2023

16:02

Falcon Insight for ChromeOS: The Industry’s First Native XDR Offering for ChromeOS

Falcon Insight for ChromeOS: The Industry’s First Native XDR Offering for ChromeOS

In recent years, ChromeOS device usage among businesses has seen a significant uptick, particularly in its adoption across verticals, from schools to large enterprises. According to recent IDC research, 16% of North American organizations have ChromeOS devices and the percentage is only expected to increase. The success of ChromeOS devices like Chromebooks can be attributed to built-in security, simple management and premium performance.

eyes

Release

27.06.2023

Post-release: CrowdStrike and Picus Security offline event for end users

Post-release: CrowdStrike and Picus Security offline event for end users

On June 26, iIT Distribution, together with its partner CS Consulting, organized an offline event for customers focused on solutions of CrowdStrike and Picus Security.

gazeta

News

31.05.2023

09:15

Opening new horizons: iIT Distribution is the official distributor of Gatewatcher

Opening new horizons: iIT Distribution is the official distributor of Gatewatcher

Gatewatcher is a cybersecurity software provider specializing in advanced breach detection. From now on, iIT Distribution will distribute Gatewatcher's advanced products and provide full support in the design and implementation of these solutions.

eyes

Articles and reviews

23.05.2023

Infinidat's storage solution pays for itself in 11 months and delivers a 162% ROI. Download the report from IDC to see for yourself.

Infinidat's storage solution pays for itself in 11 months and delivers a 162% ROI. Download the report from IDC to see for yourself.

Infinidat helps enterprises and service providers extend and scale their data-driven competitive advantage. Infinidat's software-defined storage architecture delivers microsecond latency, 100% availability, and scalability with a significantly lower total cost of ownership than competing storage technologies.

gazeta

News

17.05.2023

12:37

Expanding the professional team: Meet the new Head of iIT Distribution's Ukrainian office

Expanding the professional team: Meet the new Head of iIT Distribution's Ukrainian office

We are proud to announce the promotion of a new Head of the Ukrainian office at iIT Distribution. Meet Serhiy Kulyk!

gazeta

News

11.05.2023

13:39

Another revolution in cybersecurity from CrowdStrike: top 5 important things to know about Managed XDR (MXDR)

Another revolution in cybersecurity from CrowdStrike: top 5 important things to know about Managed XDR (MXDR)

CrowdStrike, a leading provider of cloud-based endpoint and workload security solutions, is creating new opportunities for partners with an expanded detection and response offering that builds on its popular Managed Detection and Response service, CrowdStrike CEO Daniel Bernard told CRN.

eyes

GTB technologies

09.05.2023

GTB Technologies is the best solution in the DLP industry

GTB Technologies is the best solution in the DLP industry

Data leakage prevention software, also known as DLP, refers to the practice of detecting and preventing information loss, namely, internal threats to leak or destroy critical data. Tech Times, an American publication that specializes in covering innovations and developments in technology, science, and healthcare and the challenges these areas face on a daily basis, has conducted its own analysis of the data leakage prevention (DLP) market and identified the top 5 products in this area. The top five is headed by GTB Technologies.

gazeta

News

03.04.2023

12:05

CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers

CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers

On March 29, 2023, CrowdStrike observed unexpected malicious activity emanating from a legitimate, signed binary, 3CXDesktopApp — a softphone application from 3CX. The malicious activity includes beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and, in a small number of cases, hands-on-keyboard activity.

eyes

Articles and reviews

24.03.2023

Labyrinth Deception Platform v2.0.51: Release notes

Labyrinth Deception Platform v2.0.51: Release notes

A new version of Labyrinth, a highly effective solution for detecting and stopping hacker activity inside corporate networks, has recently been released. This update offers a number of new and improved features, as well as important fixes, which we will discuss in detail in this article.

eyes

Articles and reviews

22.03.2023

SIEM vs Log Management Systems: What you need to know before choosing

SIEM vs Log Management Systems: What you need to know before choosing

Both solutions are similar in that they are both designed to aggregate and correlate event data from multiple sources. SIEM solutions tend to be more advanced than a typical Log Management System; however, the functionality of Log Management Systems can vary considerably, and it’s important to note that “more advanced” does not necessarily mean better. Here's a look at the differences between the two technologies and how they can be extended to improve visibility and control over a complex IT environment.

gazeta

Articles and reviews

14.03.2023

20:51

CrowdStrike Falcon Named the Winner of the 2022 AV-TEST Award for Best MacOS Security Product

CrowdStrike Falcon Named the Winner of the 2022 AV-TEST Award for Best MacOS Security Product

AV-TEST Institute has recognized CrowdStrike Falcon® Pro for Mac as the best MacOS business security product for 2022 after rigorous testing and analysis. AV-TEST has finalized its 2022 MacOS security product evaluation for business users after a year-long series of tests in which Falcon Pro for Mac was the only security product to score a perfect 18.0 in three consecutive quarterly evaluations.

gazeta

Articles and reviews

10.03.2023

20:59

CVE-2023-21716: Microsoft Word Remote Code Execution Exploit Explained

CVE-2023-21716: Microsoft Word Remote Code Execution Exploit Explained

As part of Patch Tuesday, Microsoft has released patches for a critical remote code execution vulnerability found in the Office Word RTF parser. The vulnerability, CVE-2023-21716, has a CVSS rating of 9.8 (critical) and affects a wide range of versions of Microsoft Office, SharePoint, and 365 Apps. Users are advised to update their applications to the latest versions as soon as possible.

gazeta

News

08.03.2023

17:16

Threema Work App Update: Encrypted Group Calls Are Now Available on Android Devices

Threema Work App Update: Encrypted Group Calls Are Now Available on Android Devices

Encrypted group calls are now available in the workplace with the secure messaging app Threema Work.

eyes

Release

03.03.2023

CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries

CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries

The CrowdStrike 2023 Global Threat Report, among the most trusted and comprehensive research on the modern threat landscape, explores the most significant security events and trends of the previous year, as well as the adversaries driving this activity.

gazeta

News

24.02.2023

14:48

CrowdStrike Ranked #1 in the IDC Worldwide Endpoint Security Market Shares Report for Third Time in a Row

CrowdStrike Ranked #1 in the IDC Worldwide Endpoint Security Market Shares Report for Third Time in a Row

CrowdStrike maintains its leadership position in the endpoint security market. The company was ranked number one in IDC's 2021-2022 report and was recognized with awards in the Best Endpoint Detection and Response and Best Product Development categories by SE Labs. These honors confirm that CrowdStrike is an innovator and market leader in endpoint security.

eyes

Articles and reviews

21.02.2023

Picus Red Report 2023: The Top 10 Most Prevalent MITRE ATT&CK Techniques Used by Attackers

Picus Red Report 2023: The Top 10 Most Prevalent MITRE ATT&CK Techniques Used by Attackers

The Picus Labs team analyzed more than 500,000 malware samples to identify the 10 most common MITRE ATT&CK techniques used by attackers last year. Download a copy of the report and stay up to date with the latest cybersecurity trends.

eyes

Articles and reviews

14.02.2023

On leadership in the sphere of high-end unified storage: An exclusive interview with Phil Bullinger, CEO of Infinidat

On leadership in the sphere of high-end unified storage: An exclusive interview with Phil Bullinger, CEO of Infinidat

StorageNewsletter.com, an online publication specializing in IT technologies, has recorded an exclusive interview with Infinidat CEO Phil Bullinger. During the conversation, Phil shared his impressions of the experience of cooperation with Infinidat before he became the company's CEO, told about the peculiarities of the company's product strategy and the benefits of the Infinidat partner program.

gazeta

News

10.02.2023

12:35

Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes

Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes

PostgreSQL is a powerful, open-source relational database management system (RDBMS). Because of its robustness and scalability, PostgreSQL is used extensively in the cloud. Most public cloud providers including AWS, Azure and GCP provide database services to their customers based on PostgreSQL.

eyes

Release

26.01.2023

What's New in NAKIVO Backup & Replication v10.8: Release Overview

What's New in NAKIVO Backup & Replication v10.8: Release Overview

NAKIVO has recently released a new version of its Backup & Replication platform, version 10.8. NAKIVO Backup & Replication is a fast, comprehensive, reliable and affordable solution for protecting physical, virtual and cloud infrastructures, as well as work environments with strict data protection requirements. The solution allows you to seamlessly backup Windows or Linux Server, ensuring consistency of application and database data.

eyes

Articles and reviews

19.01.2023

How to detect and prevent phone hacking?

How to detect and prevent phone hacking?

In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. While this technology offers great possibilities and convenience, it also can put your personal data at risk. Phones are lucrative targets of attacks because they hold so much valuable information stored in a single place, such as private or financial information. Luckily, there are key signs you can look out for — and steps you can take — to protect your device.

gazeta

News

12.01.2023

14:19

CrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost Radar for Cyber Threat Intelligence

CrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost Radar for Cyber Threat Intelligence

CrowdStrike has once again been recognized as a global leader in the Frost Radar Global Cyber Threat Intelligence Market, 2022 by Frost & Sullivan. Earlier this year, CrowdStrike was already named a leader in Quadrant Knowledge Solutions' SPARK for Digital Threat Intelligence Management matrix; and last year it was recognized as a leader in The Forrester Wave: External Threat Intelligence Services, for the first quarter of 2021.

eyes

Articles and reviews

04.01.2023

How to establish cyber strategy in the face of growing threats ?

How to establish cyber strategy in the face of growing threats ?

As new security practices and measures are put in place, new work arounds will be created with threat actors constantly changing their tactics and looking for new routes to enter vulnerable systems. It can feel like an endless game, so how can businesses get ahead with cybersecurity ?

gazeta

News

22.12.2022

12:56

New vendor in the iIT Distribution portfolio: Signing a partnership agreement with Threema

New vendor in the iIT Distribution portfolio: Signing a partnership agreement with Threema

Starting now, we open the benefits of a fully secure corporate communication application from the Swiss developer Threema to Ukrainian organizations! Take the opportunity to purchase and test Threema solutions in Ukraine and get full support in designing and implementing custom solutions from our experts.

eyes

Articles and reviews

21.12.2022

How Breach and Attack Simulation Helps to Operationalize MITRE ATT&CK

How Breach and Attack Simulation Helps to Operationalize MITRE ATT&CK

MITRE ATT&CK is a globally accessible knowledge base of attacker tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a basis for developing specific models and methodologies to counter threats for companies in various sectors of the economy, as well as in the community of developers of cybersecurity products and services.

eyes

Articles and reviews

09.12.2022

DDoS Attack Prevention and DDoS Protection Best Practices

DDoS Attack Prevention and DDoS Protection Best Practices

Easy to launch and often devastatingly effective, a distributed denial of service (DDoS) attack is one of the most common threats in today’s cybersecurity landscape. In simple terms, a DDoS attack seeks to disrupt a target’s connectivity or user services by flooding its network with an overwhelming volume of fraudulent traffic, typically through a botnet. The motivation behind the attack can vary from political protests, cyberwarfare, illicit competitive advantage, or extortion to undermining the victim’s security stack as a cover for data theft. In some cases, ransomware gangs even launch DDoS attacks against their victims to increase the pressure for payment. Knowing how to stop a DDoS attack is a critical priority for cybersecurity professionals.

eyes

Articles and reviews

21.11.2022

How Hackers Can Bypass Multi-Factor Authentication

How Hackers Can Bypass Multi-Factor Authentication

Multi-factor authentication (MFA) is an authentication protocol that requires users to enter additional factors to log into their account. However, attackers have learned to overcome even these levels of protection. Learn how hackers can bypass multi-factor authentication and how to prevent it.

gazeta

News

08.11.2022

16:49

CrowdStrike Achieves Red Hat OpenShift Certification: Streamlining Visibility and Automating Protection for OpenShift

CrowdStrike Achieves Red Hat OpenShift Certification: Streamlining Visibility and Automating Protection for OpenShift

As organizations expand their cloud-native initiatives and increase their use of containers and Kubernetes in production, they face challenges regarding container security, monitoring, data management and networking. To meet this growing need, we’re pleased to announce our certification of Red Hat OpenShift through the CrowdStrike Falcon platform — giving joint customers comprehensive breach protection for OpenShift nodes, workloads and containers.

gazeta

News

03.11.2022

15:49

Infinidat Recognized as a Leader in Gartner Magic Quadrant for Primary Storage – 5th Year in a Row

Infinidat Recognized as a Leader in Gartner Magic Quadrant for Primary Storage – 5th Year in a Row

Infinidat, a leading provider of enterprise storage solutions, today announced that the company has been named a Leader in the 2022 Gartner Magic Quadrant for Primary Storage, marking the 5th consecutive year that Gartner has recognized Infinidat’s in enterprise storage, including four years in the Primary Storage Magic Quadrant and one year in the Magic Quadrant for general-Purpose Disk Arrays.

eyes

Articles and reviews

31.10.2022

Urgent cyber defense measures in the context of international tensions and cyber warfare

Urgent cyber defense measures in the context of international tensions and cyber warfare

Ever since the Russian military launched a full-scale invasion of Ukraine, we have anticipated possible hostile cyber campaigns targeting both the battlefield and NATO member states. Therefore, vigilance and prudence are key for both commercial organizations and government institutions. Ukrainian organizations and the world community must be ready to overcome the consequences of a potential cyber war, which may go beyond Ukrainian borders.

eyes

Release

19.10.2022

New version of NetBrain Release 11: the key to reducing the cost of NetOps

New version of NetBrain Release 11: the key to reducing the cost of NetOps

NetBrain Technologies - провідний постачальник рішень для автоматизації та візуалізації гібридних мереж, випустив Release 11, основну нову версію четвертого покоління своєї системи автоматизації діагностики проблем (Problem Diagnostic Automation system, PDAS), яка дозволяє клієнтам знизити вартість мережевих операцій шляхом використання новаторської технології NetBrain на основі намірів у всій системі та автоматичної генерації тисяч мережевих намірів, що охоплюють структуру всієї гібридної мережі, та можуть бути застосовані для запобігання збоїв у роботі мережі.

eyes

Articles and reviews

13.10.2022

With security revenue surging, CrowdStrike wants to be a broader enterprise IT player

With security revenue surging, CrowdStrike wants to be a broader enterprise IT player

The American edition of Protocol, which specializes in elucidating topics related to people, power and technology, has released a detailed review of CrowdStrike's leadership in the global corporate IT market. Get acquainted with the Ukrainian adaptation and find out what factors contribute to the powerful development of CrowdStrike.

gazeta

News

05.10.2022

09:44

CrowdStrike Announced the Acquisition of Reposify to Bolster Visibility and Reduce Risk Exposure of External Assets

CrowdStrike Announced the Acquisition of Reposify to Bolster Visibility and Reduce Risk Exposure of External Assets

CrowdStrike, a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, announced it has agreed to acquire Reposify Ltd. Reposify provides an external attack surface management (EASM) platform that scans the internet for exposed assets of an organization to detect and eliminate risk from vulnerable and unknown assets before attackers can exploit them. With Reposify, CrowdStrike will provide a fundamentally differentiated EASM experience to customers as part of its world-renowned Threat Intelligence product suite, combining deep insights on endpoints and IT environments with internet scanning capabilities that deliver an adversarial-view of organizational risk across internal and external attack surfaces. CrowdStrike will also leverage Reposify’s capabilities to bolster its rapidly growing Security and IT Operations product suite.

eyes

Articles and reviews

22.09.2022

Kubernetes vs Docker: What’s the Difference?

Kubernetes vs Docker: What’s the Difference?

Kubernetes and Docker are two of the most popular container orchestration and building platforms on the market. The Docker toolkit provides a means to create, share, and package containers on a single node to provide a faster and easier delivery process for developers. Kubernetes, on the other hand, is designed to eliminate manual scaling and deployment operations by running these packaged containers in a cluster.

gazeta

Articles and reviews

15.09.2022

12:03

Infinidat Extends NVMe/TCP to VMware Environments

Infinidat Extends NVMe/TCP to VMware Environments

With the release of the new version of the InfiniBox software, Infinidat will be one of the few providers of an NVMe/TCP-certified enterprise storage solution for VMware. These new capabilities complement Infinidat's extensive integration with VMware, which improves the experience of enterprise users across the entire VMware portfolio.

gazeta

Articles and reviews

14.09.2022

16:39

New features of InfiniBox from Infinidat: vVols replication for VMware environments

New features of InfiniBox from Infinidat: vVols replication for VMware environments

Infinidat, a leading provider of enterprise storage solutions, announced two new features to enhance today's VMware infrastructures: vVols replication with VMware Site Recovery Manager (SRM) integration and NVMe/TCP certification with vSphere ESXi. These new capabilities complement Infinidat's extensive integration with VMware, which improves the experience of enterprise users across VMware's software portfolio, including vSphere, vRealize and VMware Tanzu offerings. We suggest you familiarize yourself with the new capabilities of the Infinidat solution and understand in detail how vVols replication works.

eyes

Articles and reviews

01.09.2022

Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever

Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever

Recently CrowdStrike unveiled the next evolution of CrowdStrike’s industry-first IOAs: artificial intelligence (AI)-powered IOAs. Available to customers immediately, AI-powered IOAs are created by cloud-native machine learning (ML) models trained on the rich telemetry of the CrowdStrike Security Cloud — the engine powering the largest market share of deployed sensors in the enterprise security landscape — and expertise from our elite threat hunting teams to predict and proactively protect against emerging classes of threats. This milestone extends our approach of unifying AI and human expertise (as it have done with CrowdStrike Falcon OverWatch) to deliver unparalleled protection.

gazeta

News

23.08.2022

13:14

The State Intelligence Service of Ukraine warns of a possible increase in cyberattacks by Russian hackers

The State Intelligence Service of Ukraine warns of a possible increase in cyberattacks by Russian hackers

The State Service for Special Communications and Information Protection of Ukraine urges to take care of security and provides recommendations on safe cyber behavior. On August 24, Ukrainians around the world will celebrate the 31st Independence Day of their country. This year, the holiday has a special meaning for all citizens, because every day we defend our statehood and sovereignty. The enemy, who is confidently repulsed by the Armed Forces, can activate his resources to cause additional destruction on an important day for us. Journalists and government officials advise to be more careful during the holidays: do not ignore air alarms, follow the news and be careful on the Internet.

gazeta

News

10.08.2022

12:05

IIT DISTRIBUTION IS THE OFFICIAL DISTRIBUTOR OF WALLIX IN UKRAINE

IIT DISTRIBUTION IS THE OFFICIAL DISTRIBUTOR OF WALLIX IN UKRAINE

iIT Distribution has signed a partnership agreement with the leading specialist in identity and access security - WALLIX! WALLIX is a developer of Privileged Access Management (PAM) solutions that offer a secure, simplified way to authorize and monitor privileged users for on-premises and cloud-based systems. The solution protects organizations from accidental or intentional abuse of privileged access to critical systems and resources.

eyes

Articles and reviews

01.08.2022

Tales from the Dark Web: How Tracking eCrime’s Underground Economy Improves Defenses

Tales from the Dark Web: How Tracking eCrime’s Underground Economy Improves Defenses

Research group CrowdStrike Intelligence has investigated how the frequency and sophistication of ransomware attacks have increased over the past year. It found that the number of ransomware-related data breaches increased by 82% in 2021 compared to 2020; in addition, 62% of attacks were found to be carried out using hands-on-keyboard techniques, again indicating that attackers continue to develop the skills necessary to bypass outdated security solutions and blackmail victims by threatening to perform a targeted data leak. We propose to find out what are the reasons for such an increase in cybercrime and how exactly hackers make money?

eyes

Articles and reviews

20.07.2022

The Rise of Botnet and DDoS Attacks

The Rise of Botnet and DDoS Attacks

Distributed Denial of Service (DDoS) attacks have become an everyday or, some might argue, an hourly problem. Using a variety of methods, DDoS attacks are carried out and used by a variety of threat actors, from lone hackers, criminal groups and hacktivists to government actors.

eyes

Articles and reviews

11.07.2022

Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers

Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers

Attackers often exploit outdated protocols to infiltrate an organization's work environment. But, despite the already known vulnerabilities of such protocols as Windows NTLM, they are still widely used. One of the latest major variations of the NTLM relay attack is the combination of the PetitPotam vulnerability with AD-CS relay, which according to the research group CrowdStrike Identity Protection is highly popular. Although the latest Microsoft security update patch released on May 10, 2022 contained a fix for the aforementioned vulnerability, the problem has not completely disappeared. The update only changes the requirements: if earlier hacking was possible without authentication, now the data of any Active Directory account is required to launch the attack.

eyes

Articles and reviews

17.06.2022

What is Data Democratization?

What is Data Democratization?

An effective data democratization strategy will enable employees to ask data-related questions and thereby improve data literacy. If employees know exactly what data they need access to, it will be easier for security teams to define appropriate access control mechanisms. Data democratization is an ongoing process that can lead to a change in corporate culture within an organization. This is especially true for large organizations that collect and store huge amounts of information.

eyes

Articles and reviews

03.06.2022

Immutable Backups Explained: All You Need to Know to Secure Your Data

Immutable Backups Explained: All You Need to Know to Secure Your Data

Most companies around the world use backup as a basic tool in the fight against ransomware and malware. Backups can help businesses remain operational and continue to serve customers during or immediately after an attack. They can also help you avoid having to pay a ransom to regain access to your data.

gazeta

News

19.05.2022

20:33

Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack

Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack

Ukrainian organizations have repeatedly become victims of Russian-sponsored cyberattacks. In early 2022, a suite of malware called WhisperGate was deployed against a number of government agencies. On February 23 of the same year, a new Wiper-type threat called DriveSlayer loomed over Ukraine, masquerading as the PartyTicket ransomware. But such actions on the part of the attackers could not go unanswered.

gazeta

News

06.05.2022

18:45

WHAT'S NEW IN LABYRINTH DECEPTION PLATFORM: RELEASE 2.0.32

WHAT'S NEW IN LABYRINTH DECEPTION PLATFORM: RELEASE 2.0.32

Labyrinth has released a new version of its more efficient solution for detecting and stopping hacking within corporate networks. This update offers a number of improved features that we will discuss in detail in this article.

gazeta

News

22.04.2022

16:01

Palo Alto Networks has disclosed vulnerabilities that could allow an attacker to disable the Cortex XDR platform

Palo Alto Networks has disclosed vulnerabilities that could allow an attacker to disable the Cortex XDR platform

The problems became known from an enthusiast with the nickname mr.d0x, who reported that the Cortex XDR agent can bypass an attacker with elevated privileges. The researcher discovered that the agent could be disabled by a local attacker with administrative privileges by simply changing a registry key, leaving the endpoint vulnerable to attack. Moreover, the function of protection against unauthorized access does not prevent the use of this method.

gazeta

News

20.04.2022

15:15

Advanced anti-DDoS solutions from A10 Networks are available for installation!

Advanced anti-DDoS solutions from A10 Networks are available for installation!

We are ready to provide our customers with trial licenses of the A10 Thunder TPS product with full functionality for the required period (including the pilot period, setup and launch periods). Please note that after signing the contract for the purchase of the solution, the time to replace the license will take a few minutes without causing the customer's system to stop.

gazeta

News

15.04.2022

14:42

Inspur Information Rated Gartner Hype Cycle Sample Vendor of Cloud-Optimized Hardware for Second Year

Inspur Information Rated Gartner Hype Cycle Sample Vendor of Cloud-Optimized Hardware for Second Year

Inspur, a leading provider of server equipment, storage systems and cloud computing services, has once again been selected by Gartner as a Sample Vendor of cloud-optimized hardware for its “Hype Cycle for Cloud Computing".

gazeta

News

07.04.2022

16:16

FAST DELIVERY OF INFINIDAT AND INSPUR SOLUTIONS AVAILABLE NOW!

FAST DELIVERY OF INFINIDAT AND INSPUR SOLUTIONS AVAILABLE NOW!

Just now, you can take advantage of fast delivery of multi-petabyte enterprise-class SZD solutions from INFINIDAT, as well as high-end server equipment from Inspur to order. We are ready to deliver the products you have chosen MAXIMUM 45 days after the application.

eyes

Articles and reviews

04.04.2022

Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities

Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities

On February 23, 2022, a series of devastating cyber attacks targeting Ukrainian organizations were carried out. According to industry reports, Go-based ransomware called PartyTicket (or HermeticRansom) was discovered in several organizations directly affected by the attack. Along with it, other malware families have been identified, including a Wiper-like program that CrowdStrike intelligence tracks as DriveSlayer (HermeticWiper).

eyes

Articles and reviews

26.03.2022

HOW NOT TO BECOME AN "UNWITTING ACCOMPLICE" OF RUSSIAN CYBER ATTACKS ON UKRAINIAN SYSTEMS (PART 3)

HOW NOT TO BECOME AN "UNWITTING ACCOMPLICE" OF RUSSIAN CYBER ATTACKS ON UKRAINIAN SYSTEMS (PART 3)

A large number of organizations around the world have services that facilitate attacks on Ukrainian digital infrastructure. And while these attacks are not intentional, as they are completely legitimate systems that have been turned into DDoS weapons, IT professionals should review their services now and take appropriate security measures using all of their security tools, not just security systems from DDoS.

eyes

Articles and reviews

22.03.2022

CrowdStrike Falcon protects against new Wiper malware used in cyberattacks against Ukraine

CrowdStrike Falcon protects against new Wiper malware used in cyberattacks against Ukraine

DriveSlayer is the second Wiper-type program to hit Ukraine in recent attacks using the WhisperGate malware. CrowdStrike Falcon customers can proactively monitor their environments using hunting queries to detect indicators of DriveSlayer presence.

eyes

Articles and reviews

20.03.2022

HOW TO NOT BECOME AN "UNCONSCIOUS ACCOMPLICE"  TO RUSSIAN CYBER ATTACKS ON UKRAINIAN SYSTEMS (PART 2)

HOW TO NOT BECOME AN "UNCONSCIOUS ACCOMPLICE" TO RUSSIAN CYBER ATTACKS ON UKRAINIAN SYSTEMS (PART 2)

In the previous article of this series, we looked at intelligence from the A10 company, which allows us to understand the nature of recent cybercrimes funded by the Russian government, aimed at Ukrainian targets. A massive surge of attacks on Ukrainian state systems occurred on the very first day of the Russian-Ukrainian war.

eyes

Articles and reviews

16.03.2022

A10 NETWORKS SECURITY RESEARCH: HOW NOT TO BECOME AN "UNCONSCIOUS ACCOMPLICE" TO RUSSIAN CYBERATTACKS ON UKRAINIAN SYSTEMS

A10 NETWORKS SECURITY RESEARCH: HOW NOT TO BECOME AN "UNCONSCIOUS ACCOMPLICE" TO RUSSIAN CYBERATTACKS ON UKRAINIAN SYSTEMS

Russian terrorists pay special attention not only to territorial attacks, but also to destabilizing cyberattacks on Ukrainian systems. In this series of articles, learn about the features and details of new attacks discovered by the security research group of A10 Networks, and find out what actions should be taken to mitigate their consequences and how not to become an "unwitting accomplice" of the aggressor.

eyes

Articles and reviews

23.02.2022

Demo: CrowdStrike Falcon detects WhisperGate virus suite

Demo: CrowdStrike Falcon detects WhisperGate virus suite

Watch a video that demonstrates CrowdStrike Falcon's powerful capabilities in step-by-step detection of WhisperGate, and make sure that this platform leaves no chance for attackers to sneak even the most sophisticated viruses into your IT infrastructure and destroy your data.

eyes

Release

23.02.2022

Inspur is the #1 company in terms of global market share of AI servers!

Inspur is the #1 company in terms of global market share of AI servers!

According to IDC estimates, Inspur is the absolute leader in the AI server industry. Having won a 16.4 percent market share, Inspur has become the #1 company in the world of artificial intelligence servers!

eyes

Release

18.02.2022

From now on, iIT Distribution is an official distributor of Picus Security solutions!

From now on, iIT Distribution is an official distributor of Picus Security solutions!

Recently, iIT Distribution signed another partnership agreement with Picus, the world market leader in BAS solutions! iIT Distribution will distribute Picus products on the territories of Ukraine, Kazakhstan, Georgia and Uzbekistan, providing full technical support and design of the company's solutions.

eyes

CrowdStrike

17.02.2022

CrowdStrike Global Threat Report 2022!

CrowdStrike Global Threat Report 2022!

Last year seemed to be difficult for the warriors of the cyber security front. With the societal changes brought on by the pandemic, hackers have had the opportunity to hone their skills and make their technology more adaptable, advanced, and insidious. As a result, the world was shaken by a number of high-profile cyber attacks.

eyes

Release

14.02.2022

iIT Distribution signed a partnership agreement with Inspur!

iIT Distribution signed a partnership agreement with Inspur!

iIT Distribution strives to provide our customers with high-tech and unique solutions for building a reliable IT infrastructure of enterprises. That is why we cooperate only with the best product IT companies!

eyes

Release

10.02.2022

Post-release: Webinar dedicated to the updated capabilities of Nakivo Backup & Replication v10.5

Post-release: Webinar dedicated to the updated capabilities of Nakivo Backup & Replication v10.5

On February 8, Nakivo and iIT Distribution successfully held a co-hosted webinar on the new features of Nakivo Backup & Replication, a solution for backup, replication and disaster recovery for physical, virtual, cloud and SaaS environments.

eyes

Release

10.02.2022

CrowdStrike's latest Falcon XDR development is now available for users!

CrowdStrike's latest Falcon XDR development is now available for users!

Based on advanced endpoint detection and response (EDR) technology and CrowdStrike Security Cloud capabilities, Falcon XDR offers users a unified, full-spectrum, next-generation Extended Detection and Response (XDR) function designed to help security teams stop breaches faster and more effectively.

eyes

Articles and reviews

02.02.2022

Familiarity with Security Operations Center (SOC) processes and the best recommendations for its effective operation from Lepide

Familiarity with Security Operations Center (SOC) processes and the best recommendations for its effective operation from Lepide

SOC representatives must always be aware of the latest threat information. This is done by gathering information from news sources and reports. They must ensure that all systems are patched/updated in a timely manner and receive signature updates and vulnerability alerts.

gazeta

News

27.01.2022

10:15

Cyberattack on Ukrainian state websites: what we know today

Cyberattack on Ukrainian state websites: what we know today

According to most official sources, the main purpose of the attack was not to steal data or disrupt government systems, but to sow chaos, panic and distrust. However, today there are additional facts that indicate that this event is much more serious than it might seem.

gazeta

News

21.01.2022

13:18

Technical analysis of WhisperGate malicious downloader targeting Ukrainian organizations

Technical analysis of WhisperGate malicious downloader targeting Ukrainian organizations

On January 15, it became known that a set of malicious programs called WhisperGate was deployed against a number of Ukrainian organizations. According to multiple reports, the incident was caused by three separate components deployed by the same attacker: a malicious bootloader that corrupts detected local drives, a Discord bootloader, and a File Wiper.

eyes

Release

14.01.2022

CrowdStrike Services Releases Incident Response Tracker for DFIR (Digital Forensics and Incident Response) Specialists

CrowdStrike Services Releases Incident Response Tracker for DFIR (Digital Forensics and Incident Response) Specialists

The CrowdStrike Incident Response Tracker is a handy spreadsheet with tabs for documenting indicators of compromise, accounts that have been compromised, compromised systems, and a timeline of significant events.

gazeta

News

12.01.2022

22:09

noPac Exploit: New Microsoft AD Vulnerability Can Completely Compromise a Domain in Seconds

noPac Exploit: New Microsoft AD Vulnerability Can Completely Compromise a Domain in Seconds

Microsoft recently disclosed two critical Active Directory-related CVEs (CVE-2021-42278 and CVE-2021-42287) that, when used in combination by an attacker, could lead to elevation of privilege and, as a result, domain compromise.

eyes

Articles and reviews

06.01.2022

7 IT trends of 2022 that should be adopted

7 IT trends of 2022 that should be adopted

How can IT teams best plan their work in these volatile times? While the coming year is sure to throw up a few twists and turns, there are some trends you can bet on in 2022. Fasten your seat belts and discover the TOP 7 technological predictions from the Automox team.

gazeta

News

30.12.2021

02:09

The leak of Pfizer's secret IP addresses is not uncommon. Protect your cloud data with proactive encryption

The leak of Pfizer's secret IP addresses is not uncommon. Protect your cloud data with proactive encryption

We often associate cyber breaches with corporate espionage or the activities of advanced groups. But are we right? This incident is an example of a fairly typical breach that is difficult to detect thanks to cloud technologies.

eyes

Articles and reviews

30.12.2021

6 scams to avoid this New Year's holiday: a selection of recommendations from Panda Security

6 scams to avoid this New Year's holiday: a selection of recommendations from Panda Security

Christmas and New Year holidays are a time of joy and goodness, but unfortunately not for cybercriminals. Many criminals use Christmas as a good opportunity to target even more victims, expanding their attack vectors.

eyes

Release

17.12.2021

How CrowdStrike protects customers from threats related to Log4Shell

How CrowdStrike protects customers from threats related to Log4Shell

CrowdStrike doesn't stop. Log4Shell, the latest critical vulnerability found in Apache Logging Services' Log4j2 library, poses a serious threat to organizations

eyes

Release

16.12.2021

What is SCAR and what technologies are the threat hunters on the Falcon OverWatch team running?

What is SCAR and what technologies are the threat hunters on the Falcon OverWatch team running?

New CrowdStrike technologies to prevent and counter security threats.

eyes

Release

09.12.2021

Acra Community Edition 0.90.0: encryption in SQL and NoSQL databases without additional programming

Acra Community Edition 0.90.0: encryption in SQL and NoSQL databases without additional programming

In the new release of Acra, a solution for protecting SQL and NoSQL databases, Cossack Labs has made a number of premium data protection tools available to every developer.

eyes

Articles and reviews

08.12.2021

11 steps to recover from a phishing attack: recommendations from Lepide

11 steps to recover from a phishing attack: recommendations from Lepide

Recently, phishing attacks have become more sophisticated and sophisticated. Don't beat yourself up if you've succumbed to any of them. However, in this case, it is necessary to act quickly to minimize the potential damage.

eyes

Release

30.11.2021

Aruba (HPE) is recognized as a leader in the Gartner Magic Quadrant for Enterprise Wired and WLAN Infrastructure 2021 report for the sixteenth year in a row!

Aruba (HPE) is recognized as a leader in the Gartner Magic Quadrant for Enterprise Wired and WLAN Infrastructure 2021 report for the sixteenth year in a row!

Only two companies have been able to maintain a position in the leaders' quadrant for 16 consecutive years, and Aruba is among them. It is the only vendor that received the highest rating in three out of five use cases, according to the Critical Capabilities Report.

eyes

Release

23.11.2021

Webinar series from iIT Distribution & NAKIVO: your reliable backup!

Webinar series from iIT Distribution & NAKIVO: your reliable backup!

iIT Distribution invites its partners and their customers to join a series of webinars organized in collaboration with Nakivo, a developer of backup and recovery solutions.

gazeta

News

21.11.2021

18:53

The CrowdStrike Falcon solution received the highest rating of AAA according to the results of testing by the SE Labs organization

The CrowdStrike Falcon solution received the highest rating of AAA according to the results of testing by the SE Labs organization

According to the Breach Response Test results presented in SE Labs' latest report, the CrowdStrike Falcon solution meets the highest AAA standard. This score clearly demonstrates Falcon's impeccable capabilities for automatic detection, defense against sophisticated attacks, and unrelenting effectiveness in neutralizing and blocking threats.

eyes

Release

15.11.2021

CrowdStrike business dinner: how was it?

CrowdStrike business dinner: how was it?

Dominic Hausman, CrowdStrike's solution architect for the CEMEA market, delivered a speech at the business meeting. He shared with the audience the latest news, further benchmarks and development strategies of CrowdStrike aimed at implementing updated features and optimizing endpoint protection solutions.

eyes

Release

08.11.2021

iIT Distribution is the official distributor of Nakivo!

iIT Distribution is the official distributor of Nakivo!

Advanced comprehensive solutions for backup, replication and updating of physical, virtual, cloud and SaaS infrastructures from the NAKIVO company are now available in the territories of Ukraine, Kazakhstan, Georgia and Uzbekistan.

gazeta

News

05.11.2021

15:01

CrowdStrike has been recognized as a global leader in modern endpoint protection in the latest IDC MarketScape report!

CrowdStrike has been recognized as a global leader in modern endpoint protection in the latest IDC MarketScape report!

In the IDC MarketScape report, analysts highlighted the advanced potential of the CrowdStrike Falcon platform due to its scalability, unique combination of industry-leading technologies, and human expertise in managed detection and response (MDR), threat detection, and proactive services.

eyes

Articles and reviews

03.11.2021

What is it the information security of the enterprise? What are the basic principles of data protection?

What is it the information security of the enterprise? What are the basic principles of data protection?

The scope of infosec is to create a set of business processes that will protect information assets, regardless of how that information is formatted, whether it is transmitted, processed or contained in storage.

gazeta

News

02.11.2021

00:26

CrowdStrike and AWS Expand Integrations to Provide Customers Multi-layered Protection Against Ransomware Attacks and Sophisticated Threats

CrowdStrike and AWS Expand Integrations to Provide Customers Multi-layered Protection Against Ransomware Attacks and Sophisticated Threats

Нещодавно CrowdStrike оголосили про розширення технічної співпраці з AWS, націленої на надання своїм користувачам посиленого захисту від загроз у хмарі, робочих навантаженнях, ідентифікаційних даних та кінцевих точках

gazeta

News

29.10.2021

15:41

Global Threat Report 2021 від CrowdStrike вже доступний українською мовою!

Global Threat Report 2021 від CrowdStrike вже доступний українською мовою!

Ексклюзивно на вітчизняному ринку кібербезпеки компанія iITD пропонує україномовну версію Звіту про глобальні загрози 2021 – одного з найочікуваніших поглиблених і експертних аналізів основних тенденцій та напрямів кіберзагроз за весь останній рік!

gazeta

News

25.10.2021

16:22

SDP чи VPN? (Чи обидва варіанти?)

SDP чи VPN? (Чи обидва варіанти?)

Як використання SDP в тандемі з наявним корпоративним VPN може забезпечити чудові результати безпеки з мінімальними збоями? Читайте в інформаційному листі від Safe-T!

gazeta

News

19.10.2021

10:58

CrowdStrike представляє перший у своєму роді XDR Module, що забезпечує виявлення інцидентів у реальному часі й автоматичне реагування по всьому стеку безпеки

CrowdStrike представляє перший у своєму роді XDR Module, що забезпечує виявлення інцидентів у реальному часі й автоматичне реагування по всьому стеку безпеки

Новітній модуль CrowdStrike розв'язує фундаментальні проблеми big data, які стосуються розширеного виявлення та реагуванні (XDR - Extended Detection and Response), забезпечуючи повну видимість і неперевершений захист в масштабах всього підприємства.

eyes

Release

19.10.2021

Infinidat – лідер серед первинних систем зберігання даних згідно зі звітом Gartner Magic Quadrant 2021

Infinidat – лідер серед первинних систем зберігання даних згідно зі звітом Gartner Magic Quadrant 2021

Тверда позиція Infinidat в Квадранті лідерів базується на власній фундаментальній ідеї — впроваджувати інновації та надавати рішення для зберігання даних з неперевершеним поєднанням 100% доступності, виключної продуктивності і мінімальної ​​сукупної вартості володіння в масштабах декількох петабайт.

gazeta

News

18.10.2021

15:53

Компанія iIT Distribution отримала статус офіційного дистриб'ютора A10 Networks

Компанія iIT Distribution отримала статус офіційного дистриб'ютора A10 Networks

A10 Networks є провідним виробником галузі завдяки різноманіттю варіантів реалізації своїх рішень, надійній модульній операційній системі власної розробки ACOS, спеціалізованій елементній базі (FPGA) та кращим масогабаритним показникам обладнання.

gazeta

Articles and reviews

11.10.2021

17:55

Впровадження інновації no-code в мережеві процеси

Впровадження інновації no-code в мережеві процеси

Технології no-code надають нетехнічним представникам бізнес-галузі можливість самостійно створювати додатки і процеси корпоративного рівня за допомогою візуальних інтерфейсів, що не вимагають знання мов кодування або скриптів

eyes

NetBrain

11.10.2021

iIT Distribution розширив арсенал своїх здобутків: фаховий сертифікат NetBrain Certified Platform Associate

iIT Distribution розширив арсенал своїх здобутків: фаховий сертифікат NetBrain Certified Platform Associate

Бренд-менеджер iIT Distribution Андрій Самойленко отримав сертифікат від NetBrain University у знак визнання успішного завершення курсу NetBrain Certified Platform Associate Exam for IE v8.0 та вдалої екзаменації.

gazeta

News

05.10.2021

13:45

SuperMem: Безкоштовний інструмент CrowdStrike Incident Response для автоматизації обробки образів пам'яті

SuperMem: Безкоштовний інструмент CrowdStrike Incident Response для автоматизації обробки образів пам'яті

Компанія CrowdStrike створила SuperMem – скрипт обробки пам'яті Windows з відкритим вихідним кодом, який допомагає експертам послідовно і швидко обробляти зразки пам'яті під час розслідувань.

eyes

Release

30.09.2021

Захід, що розширює кордони знань і можливостей:  Перший Щорічний Форум з Кібербезпеки CS² DAY 2021 справив справжній фурор на гостей!

Захід, що розширює кордони знань і можливостей: Перший Щорічний Форум з Кібербезпеки CS² DAY 2021 справив справжній фурор на гостей!

24 вересня на інноваційному івент-майданчику PMHUB компанія iIT Distribution сумісно з CrowdStrike зібрали понад 250 гостей, а нашу онлайн-трансляцію передивилися понад 1000 глядачів!

calendar

Conference

23.09.2021

На завершення знайомства з партнерами заходу CS² DAY представляємо компанію-системного інтегратора – CS Consulting!

На завершення знайомства з партнерами заходу CS² DAY представляємо компанію-системного інтегратора – CS Consulting!

Спеціалісти CS Consulting допомагають клієнтам зміцнювати свої позиції безпеки, надаючи необхідні послуги та рішення для запобігання успіху потенційної кібератаки. Вони мають у своєму портфелі рішень лише перевірених, провідних світових постачальників кращих програмних забезпечень.

calendar

Conference

21.09.2021

Провідний фахівець Security-підрозділу компанії IBM Віталій Воропай завітає на CS² DAY в якості спікера!

Провідний фахівець Security-підрозділу компанії IBM Віталій Воропай завітає на CS² DAY в якості спікера!

Тема промови запрошеного експерта: «Зменшуємо хаос, збільшуємо можливості». Виступ буде вкрай інформативним та присвячуватиметься новітнім підходам до забезпечення надійного кіберзахисту для будь-яких IT-інфраструктур.

calendar

Conference

20.09.2021

Список спікерів Першого Щорічного Форуму з Кібербезпеки лише поповнюється: знайомтеся з Дмитром Петращуком від компанії IT-Specialist

Список спікерів Першого Щорічного Форуму з Кібербезпеки лише поповнюється: знайомтеся з Дмитром Петращуком від компанії IT-Specialist

В рамках промови буде викладено власний практичний досвід використання платформи безпеки CrowdStrike для протистояння викликам, які постають перед SOC. Технології та методи нападу і захисту в кіберсвіті постійно розвиваються. В результаті чого, вимоги до компетенцій аналітиків SOC та функціональних можливостей систем захисту невпинно зростають.

calendar

Conference

20.09.2021

На CS² DAY виступлять представники державного сектору: Віктор Жора та Олександр Галущенко!

На CS² DAY виступлять представники державного сектору: Віктор Жора та Олександр Галущенко!

На захід завітають заступник голови Державної служби спеціального зв’язку та захисту інформації України Віктор Жора та провідний інспектор Національного координаційного центру безпеки при Раді національної безпеки і оборони України Олександр Галущенко.

calendar

Conference

17.09.2021

Зустрічайте наступного запрошеного спікера довгоочікуваного CS² DAY – Олексія Зайончковського від компанії Netwave!

Зустрічайте наступного запрошеного спікера довгоочікуваного CS² DAY – Олексія Зайончковського від компанії Netwave!

Олексій Зайончковський розповість про місце й значення платформи Crowdstrike Falcon в типовій архітектурі інформаційної безпеки організацій, а також про виконання нею типових задач та розподіл обов’язків між ролями ІТ і ІБ.

calendar

Conference

16.09.2021

Представляємо другого спікера CS² DAY: Михайло Кропива – InfoSec Director топової української IT-компанії SoftServe!

Представляємо другого спікера CS² DAY: Михайло Кропива – InfoSec Director топової української IT-компанії SoftServe!

Михайло Кропива розповість історію пошуку та впровадження компанією SoftServe найкращого рішення для кібербезпеки класу EDR (Endpoint Detection and Response). Якщо вам критично важливо зберегти конфіденційність корпоративних даних і забезпечити безперебійну роботу серверів вашої компанії, вам, вочевидь, буде надзвичайно корисно послухати про шлях ефективного переосмислення системи кіберзахисту SoftServe.

calendar

Conference

16.09.2021

Познайомтеся ближче з компанією-головним партнером CS² DAY та першим спікером заходу – Майклом Чальватцісом!

Познайомтеся ближче з компанією-головним партнером CS² DAY та першим спікером заходу – Майклом Чальватцісом!

CrowdStrike – співорганізатор Першого Щорічного Форуму з Кібербезпеки CS² DAY 2021, ця компанія є унікальною своїми високоефективними підходами до створення продуктів для забезпечення ІТ-захисту. Від імені CrowdStrike на заході виступить Майкл Чальватціс - Віцепрезидент регіону Центральної та Східної Європи.

eyes

Release

08.09.2021

iIT Distribution та CrowdStrike запрошують на CS² DAY – Перший Щорічний Форум з Кібербезпеки!

iIT Distribution та CrowdStrike запрошують на CS² DAY – Перший Щорічний Форум з Кібербезпеки!

Тепер українські фахівці матимуть можливість перейти на новий рівень знань в галузі кібербезпеки всього за один день! Адже СS² DAY – захід, присвячений ексклюзивному обміну досвідом впровадження сучасних моделей захисту від нових вразливостей та атак. Це по-справжньому визначна подія для тих, хто прагне підвищити рівень безпеки своєї IT-інфраструктури.

gazeta

News

03.09.2021

14:11

Компанія iITD зібрала своїх партнерів на бізнес-вечері A10 Vendor`s Day

Компанія iITD зібрала своїх партнерів на бізнес-вечері A10 Vendor`s Day

Під час івенту були яскраво представлені новітні рішення від A10 Networks, з якими нас познайомили Юлій Явич, менеджер з продажу в RCIS, Ukraine, Baltics A10 Networks, і Янів Хесс, старший системний інженер A10 Networks.

calendar

Conference

30.08.2021

Модель Zero Trust і система DLP: що нового розповіли наші представники та партнери на міжнародній конференції «Digital Change & Customers — Цифрові зміни та клієнтський сервіс»

Модель Zero Trust і система DLP: що нового розповіли наші представники та партнери на міжнародній конференції «Digital Change & Customers — Цифрові зміни та клієнтський сервіс»

На заході пролунали змістовні та по-своєму новаторські виступи від представниці iIT Distribution, pre-sales менеджерки Іни Лазаренко та нашого партнера, pre-sales менеджера GTB Technologies Олександра Погребного. Вони під новим кутом поглянули на шляхи ефективного впровадження моделі Zero Trust і системи DLP, які є чи не першочерговими «маст хев» рішеннями для оптимізації кіберсередовища компаній, особливо тих, що перебувають у тотальній залежності від цілісності й конфіденційності своїх баз даних.

calendar

Conference

05.08.2021

We invite you to the international conference "Digital Change & Customers”

We invite you to the international conference "Digital Change & Customers”

To assist the financial sector in solving cybersecurity problems, the International Financial Club «БАНКИРЪ» gathers representatives of the financial, public and insurance sectors, as well as the best experts of the technology industry within the international conference "Digital Change & Customers " on August 12 at the Kyiv convention center INVERIA. Participants will meet within an offline event to discuss new emerging problems of fintech and find the best ways to solve them.

eyes

Articles and reviews

28.07.2021

IT'S TIME TO STOP THE FEAR OF NEW TECHNOLOGIES: HOW CAN YOU CHANGE YOUR USUAL SOLUTION PROVIDERS AND IMPLEMENT MORE ADVANCED TECHNOLOGIES INTO YOUR INFRASTRUCTURE?

IT'S TIME TO STOP THE FEAR OF NEW TECHNOLOGIES: HOW CAN YOU CHANGE YOUR USUAL SOLUTION PROVIDERS AND IMPLEMENT MORE ADVANCED TECHNOLOGIES INTO YOUR INFRASTRUCTURE?

The basis of any company's strategy that's going to function for decades (at least) is expansion. Business develops: the branches is appearing, the network is expanding, the number of employees, including those who work remotely, is increasing, and operational processes become more complex. All that make the IT-infrastructure of this business change, modernize and expand in direct proportion, as well as requires the implementation of new systems in addition to the existing ones.

eyes

Articles and reviews

20.07.2021

Achieve petabyte-scale data protection with lightning-fast recovery!

Achieve petabyte-scale data protection with lightning-fast recovery!

Is your organization prepared for a ransomware attack? How about one that targets your backup? InfiniGuard protects your backup with snapshots that cannot be deleted, encrypted, or changed and begins the recovery process near-instantaneously.

gazeta

News

12.07.2021

14:13

Infinidat — is the best choice for Gartner Peer Insights 2021 customers!

Infinidat — is the best choice for Gartner Peer Insights 2021 customers!

The company becomes the owner of this award based on customer reviews and evaluations for the third year in a row! This recognition is especially important for the manufacturer Infinidat, because the choice is made directly by users. Companies recognize Infinidat for its reliability, performance, scalability, unique architecture and best support.

gazeta

News

06.07.2021

11:27

CrowdStrike took first place in the market share of Modern Endpoint Security 2020!

CrowdStrike took first place in the market share of Modern Endpoint Security 2020!

CrowdStrike ranked first in revenue in 2020 in the global corporate endpoint security market according to IDC Worldwide Corporate Endpoint Security Market Shares. The report is another confirmation of CrowdStrike's market leadership and demonstrates the proven effectiveness of the CrowdStrike Falcon platform.

gazeta

News

05.07.2021

13:58

A10 Thunder ADC application delivery controller in our warehouse!

A10 Thunder ADC application delivery controller in our warehouse!

Overview of the Thunder ADC 1040 load balancer and all the benefits of solutions from A10 Networks.

eyes

Release

22.06.2021

The announcement of a new solution for storing InfiniBox SSA corporate class data from infinidat!

The announcement of a new solution for storing InfiniBox SSA corporate class data from infinidat!

InfiniBox SSA is the first system to use 100% solid state technology for permanent storage. The combination of Infinidat Neural Cache's patented machine learning algorithm and increased DRAM cache takes the revolutionary performance of the InfiniBox array to a new level with a capacity of up to 546 TB and an IOPS of up to 1,5 million.

calendar

Conference

10.06.2021

The invitation to the third virtual forum CrowdStrike!

The invitation to the third virtual forum CrowdStrike!

CrowdStrike, the world leader in endpoint protection, invites everyone to join the third CrowdStrike Virtual Forum 2021 on the 17 - th of June to gain tremendous experience from the first people in the field of online cybersecurity.

gazeta

News

07.06.2021

13:37

The first deliveries of Aruba network equipment

The first deliveries of Aruba network equipment

The first items of Aruba equipment have appeared — 6100 series network switches and 9000 Aruba gateways are in our warehouse. Find out about the current availability!

eyes

GTB technologies

01.06.2021

GTB Technologies comprehensive DLP solution received a certificate from the State Service for Special Communications and Information Protection of Ukraine

GTB Technologies comprehensive DLP solution received a certificate from the State Service for Special Communications and Information Protection of Ukraine

The results of the expert assessment confirm that the information security system GTB DLP Suite meets high standards of technical information protection, the requirements of the current legal framework for security and can be used to create comprehensive information security systems for various purposes in public and commercial organizations.

eyes

Articles and reviews

31.05.2021

How subtle attacks maximize hackers' profits and what defensive actions need to be taken immediately

How subtle attacks maximize hackers' profits and what defensive actions need to be taken immediately

Demanding programs change their image. Do they pay ransom, how to protect themselves and what to do in case of ransomware attacks?

eyes

Automox

19.05.2021

iIT Distribution is the official distributor of Automox

iIT Distribution is the official distributor of Automox

With the Automox solution, your IT teams can easily deploy patches and updates on desktops, laptops, servers, other devices, and virtual machines using a single, intuitive web console.

gazeta

News

18.05.2021

14:04

A series of training workshops from CrowdStrike

A series of training workshops from CrowdStrike

CrowdStrike provides overview access to its main solution - the Falcon platform - the industry's first cloud platform to protect end devices, and creates a series of interactive workshops for everyone!

gazeta

News

11.05.2021

11:25

CrowdStrike has become the leader in the Gartner Magic Quadrant 2021 for the second time among endpoint protection platforms!

CrowdStrike has become the leader in the Gartner Magic Quadrant 2021 for the second time among endpoint protection platforms!

Gartner has recognized CrowdStrike as a leader in endpoint security (EPP) security vendors. CrowdStrike became the only company that not only maintained its leading position, but also for the second time in a row took the best position among Visionaries in the Magic Quadrant EPP!

eyes

Release

11.05.2021

Review of the new version of NetBrain Integrated Edition 10.0. Continuation

Review of the new version of NetBrain Integrated Edition 10.0. Continuation

The second part of our review of the updated NetBrain v10.0 platform.

eyes

Release

28.04.2021

Review of the new version of NetBrain Integrated Edition 10.0

Review of the new version of NetBrain Integrated Edition 10.0

With the release of the updated NetBrain v10.0, the company has expanded the industry's best set of tools for network automation with a wide range of new features that scale automation for end-to-end hybrid network operations.

gazeta

News

26.04.2021

10:00

Infinidat is launching a partner accreditation program

Infinidat is launching a partner accreditation program

The new accreditation program will help increase the readiness of partners to provide assistance to corporate customers and cloud service providers.

gazeta

News

16.04.2021

11:35

iIT Distribution is the official distributor of Lookout

iIT Distribution is the official distributor of Lookout

We provide solutions for mobile device management and their protection from the world leader in mobile threat management.

gazeta

News

12.04.2021

10:00

iIT Distribution expands its portfolio with networking solutions from Aruba Networks

iIT Distribution expands its portfolio with networking solutions from Aruba Networks

We provide supplies for the entire product line of the vendor, which is annually ranked among the leaders in the wired and wireless access networks market according to IDC MarketScape and Gartner Magic Quadrant (the leader of the quadrant for 15 years in a row!).

gazeta

News

12.04.2021

09:00

IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program

IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program

Obtaining this status opens up even more opportunities for our partners to implement projects based on Hewlett Packard Enterprise solutions.

eyes

Articles and reviews

08.04.2021

Why should hosting providers pay attention to Infinidat data storage solution? Practical experience of use

Why should hosting providers pay attention to Infinidat data storage solution? Practical experience of use

All the advantages of InfiniBox on the example of using the platform managed by the cloud hosting provider Virtual Data Corp.

eyes

Articles and reviews

05.04.2021

The ZTNA model helps reduce the stress loading of employees from remote work

The ZTNA model helps reduce the stress loading of employees from remote work

Gartner recommends choosing network security for reliable and uninterrupted remote operation by evolving to zero-trust network access principles.

gazeta

News

30.03.2021

09:54

Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!

Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!

CrowdStrike continues a series of good news and receives the highest scores on 11 criteria, as well as in the market presence category in the report The Forrester Wave: Managed Detection And Response (MDR) for the first quarter of 2021, which makes it a leader in its class.

gazeta

News

24.03.2021

11:22

Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!

Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!

CrowdStrike earned the highest possible score in 17 criteria and first place in the Market Presence category, showing us that more customers trust CrowdStrike than any other vendor.

eyes

Articles and reviews

15.03.2021

New Forrester study shows all the economic benefits of using the Falcon Complete!

New Forrester study shows all the economic benefits of using the Falcon Complete!

A recent large-scale study conducted by Forrester Consulting on behalf of CrowdStrike, entitled “The overall economic impact of using CrowdStrike Falcon Complete” revealed all the benefits of CrowdStrike’s approach to controlled detection and response to

calendar

Conference

02.03.2021

iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!

iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!

On the third of March Kyiv will host the main event of the domestic ICT market! This annual unique industry event promises to fill visitors with a unique atmosphere and a powerful flow of information. IIT Distribution, as the official partner of the event, together with NetBrain and CrowdStrike, will share their knowledge in the field of information security.

eyes

Release

24.02.2021

CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!

CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!

CrowdStrike presents an advanced data processing platform for the next generation of XDRю Learn more about the CrowdStrike Falcon platform and what's new with Humio!

eyes

Release

18.02.2021

Intelligent IT Distribution at the international conference "Go Digital - 2021: acceleration and migration. Money goes online".

Intelligent IT Distribution at the international conference "Go Digital - 2021: acceleration and migration. Money goes online".

Post-release about the event and our main conclusions of the conference. The speech of our network engineer about the solution from NetBrain is already available here!

calendar

Conference

08.02.2021

International Conference "Go Digital - 2021: acceleration and migration. Money goes online".

International Conference "Go Digital - 2021: acceleration and migration. Money goes online".

IIT Distribution invites banking, insurance, non-banking financial and MFI companies to the conference. As a partner of the event, we speak on the topic: "Review of network documentation and automation from NetBrain."

gazeta

News

25.01.2021

11:52

Crowdstrike's response to recent supply chain attacks

Crowdstrike's response to recent supply chain attacks

You've probably heard the latest news that attackers have used SolarWinds software to gain access to the corporate networks of many large institutions around the world. An important signal is that after this hack, SolarWinds became a CrowdStrike client. This is a special message for our partners, designed to keep you informed.

gazeta

News

08.10.2020

10:27

Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"

Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"

October 6, 2020 The Third Annual International Forum "Cyber Security - Protect Business, Protect the State" was held in Kyiv, in which iIT Distribution acted as a partner and sponsor. We thank the organizers of the CIS Events Group forum and the Chamber of Commerce and Industry of Ukraine. We believe that the support of such state structures as the National Security and Defense Council of Ukraine, the State Service for Special Communications and Information Protection of Ukraine and the Cyberpolice shows that cybersecurity is finally being brought to the level of state strategy.

gazeta

News

29.09.2020

22:49

IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020

IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020

Ukraine is among the top 10 countries that have often been the target of significant and systemic cyberattacks over the past 14 years (Specops, 2020). That is why the joint efforts of the government and business aimed at strengthening cybersecurity measures in Ukraine are extremely important for our country. The Intelligent IT Distribution (iITD) team is proud to be a partner of such an important event for Ukraine as the Third International Forum "Cybersecurity - Protect Business, Protect the State", organized by the Chamber of Commerce and Industry of Ukraine. The speakers of the conference are leading Ukrainian and global cybersecurity experts: Gennady Chizhikov, President of the Chamber of Commerce and Industry of Ukraine, Oleksiy Danilov, Secretary of the National Security and Defense Council of Ukraine, Mykhailo Shmelyov, Microsoft Director of Technology Strategies and Policies for Central and Eastern Europe Olaf Schultz, Nokia's Director of EU Cooperation and Development Strategy, Germany, Alexander Timoshik, Head of Information Security, Raiffeizen Bank Aval, and others. The program of the forum consists of a plenary session and 5 interdisciplinary sections: Section 1: Safe online environment - coronavirus experience. Section 2: Cybersecurity is not an application, but a product built into each system since its inception. Section 3: Current issues of information protection in the banking and financial sector. Section 4: Technology and Law: Adjusted Steps to Digital Transformation. Section 5: Education as a basis for the formation of a new culture of behavior in cyberspace. Please pay special attention to the report "Hidden threat - the most unexpected leaks" (speaker - Alexander Pogrebny, Solution Manager of GTB Technologies). To comply with restrictions and recommendations regarding the fight against Covid-19, the event will take place in a chamber format in the conference hall "Colosseum" of the Chamber of Commerce and Industry of Ukraine at Velyka Zhytomyrska Street, 33, Kyiv. Everyone has the opportunity to take part in the online format of the meeting.

gazeta

IT infrastructure management

24.09.2020

08:32

iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine

iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine

IIT Distribution has signed a distribution agreement with NetBrain Technologies, a market automation market leader. Under this agreement, the iIT Distribution team provides distribution and promotion of solutions in Ukraine. That is, now you have the opportunity to purchase NetBrain Technologies products in Ukraine and receive professional support for their design and implementation. NetBrain Technologies was founded in 2004. The technology platform is designed so that engineers have full visibility of hybrid environments, as well as the ability to easily automate them for working IT processes. Currently, 2,300+ leading corporations use NetBrain solutions to automate network documentation, fast troubleshooting, and enhanced network security with seamless integration with partner organizations' ecosystems. NetBrain's head office is located in the United States (Burlington, Massachusetts) and also operates regional offices in China, Germany, the United Kingdom and Germany. Nowadays, infrastructure management is a much more difficult task than ever before. NetBrain provides the ability to track the full picture of multi-infrastructure networks with many providers. That is, you get a functional and comprehensive analysis of physical, virtual and software-defined networks of the organization. This allows you to have full visibility of processes in the network. The importance of network automation is especially important in the remote work of a large number of corporate employees. The ability to automate processes and manage changes in networks, allows companies to work more effectively with employees regardless of their location. We invite you to send a request for a demo version of NetBrain Technologies solutions, and order product testing!

calendar

Conference

28.08.2020

Fal.Con 2020 by CrowdStrike

Fal.Con 2020 by CrowdStrike

CrowdStrike, a leader in cybersecurity, invites you to Fal.Con 2020. By joining this virtual event, you can choose from 70 training sessions that cover the most relevant topics related to data protection. IIT Distribution is the exclusive distributor of CrowdStrike products in Ukraine. Fal.Con 2020 is an event that everyone who is interested in cybersecurity should attend. Participants will be able to choose panel presentations and training modules, which will help develop effective strategies for their companies, increase preparedness to counter cyber threats and effectively prepare their organization to operate in today's threat landscape.

eyes

Articles and reviews

25.08.2020

Compliance with cyberrisk insurance

Compliance with cyberrisk insurance

The threat of data leaks is now an important component of the operational risk of corporations, which is why data security insurance is in great demand. This area is showing rapid growth, its volume will soon become multibillion in US dollars.

gazeta

News

25.08.2020

12:47

Automatically block compartment accounts with Lepide Active Directory Self Service 20.1

Automatically block compartment accounts with Lepide Active Directory Self Service 20.1

After the last update of the Lepide Active Directory Self Service system (LADSS) 20.1, administrators can block users who entered several incorrect passwords for a certain period.

calendar

Conference

25.08.2020

Cossack Labs invites you to visit NONAMECON

Cossack Labs invites you to visit NONAMECON

The Cossack Labs team has been supporting the NoNameCon conference for several years in a row, which usually takes place in the spring in Kyiv. This year, thanks to the COVID-19 pandemic, the event will take place exclusively in virtual format. Topics of reports and discussions at the conference are divided into several different areas of cybersecurity: September 3 - red (offensive security), September 4 - blue (defensive security). The first day is scheduled for a video interview with the legendary Bruce Schneier, and the second for reports on post-quantum cryptography, browser and anti-virus behavior, bot creation and protection. The conference will also feature workshops and debates, a traditional hacking quiz, and online entertainment, including an online afterparty.

eyes

22.07.2020

Signing a distribution agreement with SAFE-T

Signing a distribution agreement with SAFE-T

IIT Distribution is pleased to announce the signing of a distribution agreement with Safe-T, a leading developer of solutions for secure and easy access to applications and files for local, cloud, and hybrid work environments.

calendar

Conference

21.07.2020

Міжнародна конференція:

International Conference "Online Banking - Time of Innovation!"

IIT Distribution is pleased to announce the signing of a distribution agreement with Safe-T, a leading developer of solutions for secure and easy access to applications and files for local, cloud, and hybrid work environments.

gazeta

News

18.06.2020

09:47

Global Cyber Threat Report 2020

Global Cyber Threat Report 2020

The Global Cyber Threat Report 2020 is one of the most anticipated reports in the industry on the biggest cyber threats and the most dangerous attackers.

gazeta

News

11.06.2020

14:51

Thursday, the 25-th of June, 2020. Do not miss!

Thursday, the 25-th of June, 2020. Do not miss!

A team of security strategy experts and threat hunters, including CrowdStrike Chief Technology Officer Mike Sentonas, will share stories from the CTO office and discuss the state of cybersecurity.

eyes

Articles and reviews

20.05.2020

PandaLabs Report: Understanding Threats 2020

PandaLabs Report: Understanding Threats 2020

PandaLabs anti-virus lab, Panda Security, recorded and analyzed 14.9 million malicious events in 2019, stopping 7.9 million potentially unwanted programs (PNPs), as well as 76,000 exploit warnings designed to exploit vulnerabilities in applications and networks. or equipment to describe in the report the main IS threats and trends. In 2020, protection of end devices from known threats will no longer be enough. The IT environment needs to be protected from unknown threats as well, because they try to stay in the shadows. To do this, IT providers need to review their IS strategies. New threats require the transition from single-tech IS to multi-level solutions that use (among other functions) behavioral monitoring to address persistent threats of increased complexity (APT), fileless attacks, and other malicious activity.

gazeta

News

05.05.2020

08:58

Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems

Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems

Encryption of confidential and personal data is determined by the regulations (GDPR, HIPAA, PCI DSS) and the best practices of the industry. However, the integration of cryptography in the modern application is often a difficult task that has a limited impact on the increase in safety and many architectural compromises. ACRA goal - change this situation.

eyes

Articles and reviews

13.04.2020

Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.

Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.

Lepide Remote Worker Monitoring Pack is an easy-to-deploy and lightweight security platform that offers immediate protection for businesses during unforeseen periods of remote work. Data Security Support - Control how data and resources are used to ensure data security and avoid data leakage. Early detection of risks - monitor important tasks, detect abnormal user behavior and take immediate action to stop threats. Increase productivity - Identify those employees who see work from home as an excuse to do nothing and get them back in shape.

Promotion

Promotion

12.04.2020

Ensuring cybersecurity for remote users

Ensuring cybersecurity for remote users

In this situation, cloud solutions from Panda Security are best suited for this. These solutions are easy to implement and maintain - for their work can be installed without a separate infrastructure. Panda Security allows you to ensure the security of all end devices located both in the office and outside it in the shortest possible time. Three reasons to use Panda Fusion 360: 1. The solution is cloud-based and does not require time and resources to deploy in the corporate network. The cloud management console allows in a few hours to get the visibility of all processes on all end devices that are

Promotion

Promotion

08.04.2020

Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months

Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months

The large number of remote devices that have access to the company's internal resources has multiplied the complexity of information security. In this situation, it has become almost impossible to secure your infrastructure by relying only on technologies such as antivirus and firewalls. Traditional perimeter protection has become essentially ineffective and things have emerged that are almost impossible to prevent. For example, if an attacker manages to obtain or guess a user's credentials and impersonate one of your employees, there is a good chance that no prevention technology will notice. These are the so-called silent failures. Perimeter protection has failed, and you have an evil you don't know about. And according to statistics, most organizations do not know about it for another 100 days or more.

gazeta

News

07.04.2020

10:48

Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months

Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months

IIT Distribution, together with CrowdStrike, announces the launch of the campaign: "CrowdStrike: remote work and IT security in times of crisis - a shortened licensing program for 3-6 months." Many companies have sent their employees home and are trying their best to provide them with everything they need for remote work. Maintaining security is a serious risk for many organizations as cybercriminals develop and use new tactics and techniques to take advantage of this wave of confusion and chaos. Against this background, CrowdStrike has adjusted the validity of licenses for new customers in accordance with the current situation. CrowdStrike's "Paid Pilot Offer" is an offer for companies whose employees are in their "home office" and who need to quickly organize the protection of IT infrastructure. Falcon Prevent, Falcon Insight or Falcon Enterprise licenses can be purchased for 3 to 6 months instead of the usual 12 months

eyes

Release

23.03.2020

IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine

IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine

IIT Distribution has signed a distribution agreement with RedSeal Networks, Inc. - developer of software solutions in the field of information security, designed for visualization and analysis of network security risks. Under this agreement, the iIT Distribution team provides distribution and promotion of solutions in Ukraine. RedSeal is an enterprise information security risk management platform that allows you to automate the process of collecting configurations of network devices (routers, switches, load balancers) and information security tools (firewalls, attack prevention systems). The configuration is obtained by connecting to devices or reading configuration files from a given repository (CMDB, file resources). Based on the received information, RedSeal automatically builds an up-to-date map of the network.

eyes

Release

23.03.2020

IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine

IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine

Many organizations experience the influence of internal threats only after data leakage, when it is too late to do something about this. The only way to ensure that this will not happen - take a proactive and comprehensive data audit strategy. Lepideauditor allows administrators to add one or more Active Directory objects, Exchange Server, SharePoint Server, SQL Server, file servers, Office365 and Dropbox. The solution provides the visibility of these components across the entire enterprise using a single powerful and easy-to-use console, where all the changes made are graphically displayed and it is possible to generate more than 270 different reports.

gazeta

News

16.03.2020

10:35

iIT Distribution starts distribution of Crowdstrike solutions in Ukraine

iIT Distribution starts distribution of Crowdstrike solutions in Ukraine

IIT Distribution announces cooperation with CrowdStrike - a world leader in the field of protection of terminal devices, and the beginning of deliveries of solutions to the Ukrainian market. CrowdStrike's main product is the Falcon platform, which is the industry's first cloud platform to protect end devices. Falcon is based on artificial intelligence (AI) and combines technology, intelligence and experience into one simple solution that reliably stops any threats.

calendar

Conference

19.02.2020

On the 20-th of February in Kiev Annual Conference Ciso DX Day 2020 will be held

On the 20-th of February in Kiev Annual Conference Ciso DX Day 2020 will be held

Why is everything so much easier with Advance Analitycs? Yuri Gatupov, CEO of iIT Distribution, will demonstrate a new approach to detecting, preventing and investigating IS incidents with Exabeam Advanced Analytics. We fully agree with Gartner experts that Exabeam Advanced Analytics is one of the best solutions for building an SOC.

eyes

18.02.2020

IIT Distribution has received the status of a distributor of Instana solutions in Ukraine

IIT Distribution has received the status of a distributor of Instana solutions in Ukraine

IIT Distribution has signed a distribution agreement with Instana, a leading developer of full stack applications for monitoring applications and infrastructure for microservices, containers, Kubernetes, and OpenShift.

Mobile Marketing
+