fbpx

Representative offices 

Request callback
btn

iIT Distribution – офіційний дистриб’ютор компанії Lookout

News

Команда iIT Distribution підписала дистриб’юторську угоду з компанією Lookout!

Lookout — це лідер в області мобільної безпеки понад десяти років. Це єдиний постачальник засобів захисту від мобільних загроз, який вже чотири роки поспіль потрапляє в список Forbes Cloud 100!

Lookout забезпечує і розширює можливості нашого цифрового майбутнього у світі, орієнтованому на конфіденційність, де мобільні пристрої необхідні для всього, що ми робимо для роботи та розваг.


Платформа безпеки Lookout захищає мобільні пристрої від шкідливих додатків, програм-вимагачів, фішингу, забезпечуючи захист кінцевих точок, управління уразливостями та мережевий доступ з нульовою довірою.


Lookout використовує штучний інтелект для аналізу даних телеметрії майже з 200 мільйонів пристроїв і понад 120 мільйонів додатків, тому ви можете не турбуватися за вашу мобільну безпеку.


ЗА ОСТАННІ 12 МІСЯЦІВ LOOKOUT ЗУПИНИВ ПОНАД 3 МІЛЬЙОНІВ МОБІЛЬНИХ ЗАГРОЗ

Завдяки дослідженню більш ніж 100 мільйонів проаналізованих програм, Lookout має найбільший у світі набір мобільних даних, що забезпечує видимість всього спектра мобільних ризиків. Це дозволяє Lookout максимально контролювати ризики, пов'язані з додатками. Ця платформа безпеки створює відбиток кожного мобільного пристрою і порівнює його з даними більш ніж 185 мільйонів пристроїв для постійного захисту від мобільних ризиків. Кожен день компанія перевіряє понад 100 000 нових додатків. Клієнти Lookout використовують Lookout App Risk для швидкого виявлення ризикованої поведінки додатків і динамічного відхилення додатків для захисту своїх організацій.


Рішення Lookout забезпечує не тільки багаторівневий захист, але і являє собою технологію управління мобільними погрозами (MTM), широко застосовується в організаціях, які прагнуть до моделі нульової довіри. Завдяки конкурентним якостям IDC MarketScape for Mobile Threat Management Software третій рік поспіль називає Lookout лідером.


Багато сучасні користувачі все частіше вибирають мобільні пристрої в якості свого основного способу комунікації з мережею, в тому числі й для робочих процесів. Очевидно, що кіберзлочинці вже давно розцінюють мобільні пристрої як одну з пріоритетних цілей. Саме тому захист мобільних пристроїв не менш важливий, ніж захист будь-яких інших пристроїв в корпоративній мережі.

Дізнатися більше про Lookout

Back

iIT Distribution expands its portfolio with networking solutions from Aruba Networks

News

We provide supplies for the entire product line of the vendor, which is annually ranked among the leaders in the wired and wireless access networks market according to IDC MarketScape and Gartner Magic Quadrant (the leader of the quadrant for 15 years in a row!).

Aruba is a leading provider of innovative solutions for access control, network infrastructure, data network equipment (access points, controllers, routers and switches) and mobile applications for corporate networks. Aruba recently launched a line of devices that support the new wireless standard, Wi-Fi 6.

The technologies and approaches of this vendor make it possible to very quickly deploy and easily manage wireless data transmission networks. Aruba solutions are characterized by low cost of ownership relative to offerings from other manufacturers, versatility of use, ease of deployment and maintenance (installation, configuration and configuration of equipment takes little time) and high level of security. These characteristics have made the demand for Aruba solutions in the corporate sector consistent with strong leadership and worldwide recognition for over a decade.

2020 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure Report 2020 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure Report.


iIT Distribution company forms its product portfolio in such a way that partners and customers can get the best and most popular solutions for their projects. Having expanded it with products in the field of network infrastructure, our specialists are ready to provide partners with qualified advice on the choice of Aruba equipment, considering specific requirements, business tasks and goals.

To learn more about Aruba

Back

IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program

News

Obtaining this status opens even more opportunities for our partners to implement projects based on Hewlett Packard Enterprise solutions, as well as receive qualified support from our specialists. By joining our efforts to drive innovation, we help our customers keep pace with today's economic reality.


HPE Business Partner status means that our specialists have been trained, successfully passed exams and have the skills and experience to ensure the most effective development of corporate IT infrastructure of enterprises.



Hewlett Packard Enterprise (HPE) is a leading global manufacturer of software and hardware solutions for creating IT infrastructure of any level. HPE technologies improve the performance, efficiency and security of your IT infrastructure, making it responsive and flexible in the face of rapidly changing competitive environments. The company is a leading provider of servers, storage systems, wired and wireless networking equipment, converged systems, software services and cloud technologies. Hewlett Packard Enterprise tirelessly continues to innovate and improve best-in-class products.


Hewlett Packard Enterprise includes Aruba is the premier manufacturer of wireless networking equipment and other advanced networking equipment. Today Aruba is one of the three absolute world leaders in this segment. Aruba solutions have earned thousands of companies' commitment to being highly secure, easy to deploy and integrate with existing networks, and easy to manage and maintain.


As an official partner we have a unique opportunity to help clients at all stages of their transition to new hybrid technologies we guarantee high-quality consulting and implementation of enterprise-class solutions based on the manufacturer's technologies.

To learn more about Aruba solution

Back

Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!

News

CrowdStrike CrowdStrike continues the good news streak, earning the highest scores on 11 criteria as well as in the market presence category in The Forrester Wave: Managed Detection And Response (MDR) for Q1 2021, making it a leader in its class.

As a reminder, the CrowdStrike Falcon X product was named the Forrester leader among Threat Intelligence providers last week. If you are new to this news, we recommend reading the full overview of the benefits for which CrowdStrike has received the highest marks and is universally recognized here.

CrowdStrike leverages the threat intelligence it collects through incident response and Falcon endpoint protection platforms, integrating organic threat intelligence from these sources into its MDR service delivery approach and delivering significant value to customers. In the Forrester report, CrowdStrike scored the highest possible score on 11 out of 19 criteria.

Based on the report, MDR will become a must-have in 2021. MDR has been around as a category of solutions for years, but analysts are predicting a sharp rise for the technology in the coming year, moving from a niche product to a necessity for many organizations.

For MDR, speed is one of the most important metrics, as it measures the ability to outrun increasingly sophisticated opponents. Forrester especially notes the speed of Falcon Complete:

  • Time of useful activity. Forrester scored 5/5 for its reactive deployment process, which ensures customers can be fully protected within days of installation, rather than weeks or months like many other vendors.
  • Threat response time. Forrester said customers interviewed highlighted that Falcon Complete's speed of response to security incidents is a key benefit and is key to staying ahead of attackers operating at increased speed. Falcon Complete closely monitors response times by following the 1-10-60 rule. This plays a significant role when cybercriminals can do damage in a matter of hours. In the latest report from CrowdStrike Services Cyber Front Lines, the Falcon Complete team showed that they can detect threats in the first minuteinvestigate in 6 minutes and remediate them in 29 minutes.
  • Quick support response. Customers also reported that general support issues such as help deploying the CrowdStrike Falcon or discovery questions were quickly and efficiently resolved by the Falcon Complete team.

CrowdStrike customer feedback highlights the speed with which the vendor responds to both detected security incidents and support issues in general, and the process-oriented nature of investigations as key strengths. Forrester also gave Falcon Complete the highest score possible for its presence in the market for MDR solutions. In less than three years since its first launch, Falcon Complete has grown to become one of the most widely deployed MDR solutions on the planet, providing 24/7 protection to thousands of customers representing millions of endpoints.


This recognition from Forrester strengthens CrowdStrike's position as the market leader in guided detection and response.

Full report The Forrester Wave: Managed Detection And Response (MDR), Q1 2021

The original source

Back

Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!

News

Forrester analysts rated Threat Intelligence providers on 26 criteria grouped into three high-level categories:

  • Current offering: Assessment of Analysis Requirements, Baseline Gathering, Information Analysis, Dissemination, Cyber Threats, Risk Analytics, and more.
  • Strategy: product vision, strategic partnerships, business model, and ancillary products and services.
  • Market presence: number of customers and revenue from product line.

CrowdStrike earned the highest possible score in 17 criteria and first place in the Market Presence category, showing us that more customers trust CrowdStrike than any other vendor.

Forrester Wave: External Threat Intelligence Services Q1 2021

Recognition of a company as a leader is associated with an assessment of the quality of the threat analysis life cycle. CrowdStrike defines five stages of the cycle:

  1. Intelligence Requirements: Define plans and targets for intelligence operations.
  2. Raw intelligence: gathering baseline information.
  3. Intelligent Analysis: Answers the questions asked during the requirements phase.
  4. Dissemination: Displays analysis results in a convenient format for end users.
  5. Feedback: Get feedback from customers and improve.

This set of five criteria is critical as they form the foundation upon which each vendor's threat intelligence capabilities are built. CrowdStrike received the highest scores on four of the above five criteria. These ratings confirm that CrowdStrike is unmatched in professionalism and analytics.

CrowdStrike received the highest score in the gathering phase of all vendors. We believe this important criterion highlights CrowdStrike's ability to collect data that no one else can, resulting in threat intelligence that no other vendor can provide.

Given the ratings, it is no surprise to us that CrowdStrike scored the highest possible score on Cyber Threat Intelligence.


CrowdStrike Falcon X enables organizations of all sizes and ages to easily deploy intelligence at the Security Management Center (SOC) and receive best-in-class analytics and technical analysis backed by a dedicated team of intelligence professionals. Based on CrowdStrike Threat Graph telemetry, which correlates over 5 trillion endpoint events per week, data collected from over a million unique sources and reviewed by the CrowdStrike analyst team, which tracks over 150 hacker groups, Falcon X gives organizations insight into tactics, methods and adversary actions, allowing clients to take proactive measures to detect and defend against current and future attacks.

CrowdStrike is also named a leader in The Forrester Wave: Enterprise Detection And Response, Q1 2020 and The Forrester Wave: Endpoint Security Suites (ESS), Q3 2019.

For more information on the benefits that helped Falcon X become a leader see CrowdStrike..

Read the full report The Forrester Wave: External Threat Intelligence Services, Q1 2021.

Back

Crowdstrike's response to recent supply chain attacks

News

You have probably heard the latest news that attackers have used SolarWinds software to access corporate networks of many large institutions around the world.

An important signal is that after this kink, SolarWinds became a customer of CrowdStrike. This is a special message to our partners to keep you updated.

WHAT HAPPENED?

The recent high-profile disclosure of a supply chain attack on software by advanced attackers made it clear that identity-centric attacks are now an integral part of the kinks. Attacks that exploit this type of vulnerability, based on the use of "lateral movement" for further actions when performing penetrations. In doing so, they use valid credentials to access the victim's corporate network, as this approach leaves fewer traces of presence. In fact, after attackers gain access to the victim's network, the attack uses multiple credentials, making it even more difficult to detect.

HOW DOES CROWDSTRIKE PROTECT CUSTOMERS?

The most important thing to know is that CrowdStrike clients are protected from recent attacks! The CrowdStrike Intelligence Team obtained various trojanized binaries and reverse engineering them for additional details, including Indicators of Compromise (IOC) and Indicators of Attack (IOA), in addition to those publicly disclosed. All harmful hostnames, IP addresses, URLs, binary hashes, registry keys and other IOCs have been added to CrowdStrike ThreatGraph. CrowdStrike analysts have added two dozen new IOAs to detect tradecraft, signaling real host compromise, as opposed to detecting the simple presence of trojanized modules. In addition, the company has deployed various tools and capabilities on the Falcon platform to help facilitate the identification of potentially affected hosts, in particular:

  • A new SUNBURST vulnerability dashboard that identifies hosts with IOCs associated with this vulnerability, including the ability to inspect, endpoint devices have compromised files in the last 90 days.
  • The scorecard allows customers to determine if there has been evidence of file or host damage over the past year.
  • Finally, customers can see Sunburst IOC detections on hosts with Cloud ML detection enabled.

CrowdStrike launched the Sunburst public information site so that organizations can learn how to avoid the harmful effects of this fracture. This website provides information on how organizations can determine if they are not compromised, what can be done to remediate breaches, and how to protect infrastructure.

Please refer your clients to the Resource Center CrowdStrike,
https://www.crowdstrike.com/sunburst/ to learn more about how they can protect their corporate network from the threat Sunburst.

Back

Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"

News

On the 6-th of October 2020 in Kyiv the Third Annual International Forum "Cybersecurity - Protect Business, Protect the State"was held in Kiev, in which iIT Distribution acted as a partner and sponsor.

We thank the organizers of the CIS Events Group and the Chamber of Commerce and Industry of Ukraine.We believe that the support of such state structures as the National Security and Defense Council of Ukraine, the State Service for Special Communications and Information Protection of Ukraine and the Cyberpolice shows that cybersecurity is finally being brought to the level of state strategy.

The Month of Cybersecurity, which has been held in Ukraine for three years in a row, received wide support in society, provided an opportunity to focus the attention of state structures, business and civil society on the urgency of problems, confirmed the effectiveness of public-private interaction in the development of safe cyberspace in Ukraine.

We, as a specialized IT distributor, presented at our booth at this event such partners as CrowdStrike (the world's number 1 leader in endpoint security) and GTB Technologies (a leading developer of solutions for protecting confidential information - DLP)Also with our support Alexander Pogrebnoy, the solution Manager of GTB Technologies, presented an informative and interesting report - "The hidden threat - the most unexpected points of information leakage".

The topic of cybersecurity today is no longer just a hype, it is a necessity of today. Our team iIT Distribution professionally works in the field of digital information protection and represents the best manufacturers on the market. Join us!

Back

IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020

Conference

06.10.2020

Ukraine is in the TOP 10 countries that have most often become the target of significant and systemic cyberattacks over the past 14 years (Specops, 2020). Therefore, it is for our country that the joint efforts of the government and business aimed at strengthening cybersecurity measures in Ukraine are extremely important.

The Intelligent IT Distribution (iITD) team decided to become a partner of such an important event for Ukraine as the Third International Forum "Cybersecurity - Protect Business, Protect the Country", organized by the Ukrainian Chamber of Commerce and Industry.

We recommend that you pay special attention to the report "The hidden threat - the most unexpected points of information leakage" (speaker - Alexander Pogrebnoy, Solution Manager, GTB Technologies).

The speakers of the conference are leading Ukrainian and world experts in the cybersecurity industry: Gennady Chizhikov, President of the Ukrainian Chamber of Commerce and Industry, Oleksiy Danilov, Secretary of the National Security and Defense Council of Ukraine, Mikhail Shmelev, Microsoft Director for Technology Strategies and Policies for the MultiCountry region of Central and Eastern Europe , Dr. Olaf Schultz, Nokia Director for Cooperation with the EU and Development Strategy, Germany, Alexander Timoshik, Head of Information Security Department, Raiffeizen Bank Aval, etc.

The forum program consists of a plenary session and 5 interdisciplinary sections:

Section 1: Safe Online Environment - Coronavirus Experience.

Section 2: Cybersecurity is not an application, but a product built into every system since its inception.

Section 3: Topical issues of information security in the banking and financial spheres.

Section 4: Technologies and Law: Corrected Terms of Digital Transformation.

Section 5: Awareness as the basis for the formation of a new culture of behavior in cyberspace.

To comply with the restrictions and recommendations for countering Covid-19, the event will be held in a chamber format in the Colosseum conference hall of the Ukrainian Chamber of Commerce and Industry at Bolshaya Zhitomirskaya Street33, Kiev. For everyone, there is an opportunity to take part in an online meeting format. 

Register to participate online

Back

iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine

News

IIT Distribution has signed a distribution agreement with NetBrain Technologies, a market leader in network automation.

Within the framework of this agreement, the iIT Distribution team provides distribution and promotion of solutions on the territory of Ukraine. That is, you have the opportunity to purchase NetBrain Technologies products in Ukraine and get professional support for their design and implementation.

NetBrain Technologies was founded in 2004. The technology platform is designed in such a way that engineers have full visibility of hybrid environments, as well as the ability to easily automate them for IT workflows.

Today more than 2300 leading corporations use NetBrain solutions to automate network documentation, quickly troubleshoot and improve network security while seamlessly integrating with an ecosystem of partner organizations.

NetBrain is headquartered in the United States (Burlington, Massachusetts), with regional offices in China, Germany, Great Britainand Germany.

Infrastructure management is now much more challenging than ever before. NetBrain allows you to trace the complete picture of multi-infrastructure networks with many vendors. That is, you get a functional and comprehensive analysis of the physical, virtual and software-defined networks of the organization. This allows you to have complete visibility of the processes on the network.

The importance of network automation is becoming a key issue in the remote work environment of a significant number of corporate employees. The ability to automate processes and manage changes in networks allows companies to work more effectively with employees regardless of their location.

We invite you to send a request for a demo version of NetBrain Technologies solutions, and order product testing!

Back

Automatically block compartment accounts with Lepide Active Directory Self Service 20.1

News

After the last update of the Lepide Active Directory Self Service system (LADSS) 20.1, administrators can block users who entered several incorrect passwords for a certain period.

Administrators can determine when the user has been unlockedand can also unlock the user manually to avoid unnecessary downtime and failures.

In addition to this new security feature, Lepide Active Directory Self Service now supports the LDAPS connection (which Lepide recommends to always configure), multifactorial authentication, new user interface design and multi-level security structure.

With the full list of Updates Lepide Active Directory Self Service 20.1, you can find the manufacturer's website.

IITD is an exclusive distributor of Lepide products in Ukraine. We invite you to request the Demo version of Lepide Data Security Platform.
On English at Lepide
Lepide Active Directory Self Service 20.1 release

Back

en_GBEnglish
ukUkrainian ru_RURussian en_GBEnglish