exclusive networks solutions guide

15
Value Add Distributor specialised in Security, Networking & Storage Solutions Guide 2013 Comprehensive overview of Exclusive Network’s product range

Upload: jukke77

Post on 27-Oct-2014

1.968 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Exclusive Networks Solutions Guide

Value Add Distributorspecialised in

Security, Networking & Storage

Solutions Guide 2013Comprehensive overview of Exclusive Network’s product range

Page 2: Exclusive Networks Solutions Guide

- 2 -Solutions Guide

Content Exclusive Networks’ Solutions Guide

Exclusive Networks A. Stocletlaan 2022570 Duffel

tel: +32 (0)15 30 55 10fax: +32 (0)15 30 55 19

[email protected] www.exclusive-networks.be

Table of Contents

p. 3 Exclusive Networks About Exclusive Networks, your contacts at Exclusive Networks

P. 4 A10 Networks A strategic vision on Application, Desktop, Server and Storage virtualization

p. 5 Aerohive Networks Wireless Networking

p. 6 Arbor Networks Network Monitoring and Security

p.7 FireEye Next Generation Threat Protection

p. 8 Fortinet Multi-Threat Security Systems for real-time Network Protection

p. 9 Infoblox DNS, DHCP and IP Address Management

p. 10 LogRhythm SIEM 2.0, Log & Event Management, Log Analysis

p. 11 Nimble Storage Flash Optimized Hybrid Storage

p. 12 Nutanix Compute & Storage Cluster

p. 13 Proofpoint Data Protection Solutions

p. 14 Silver Peak Data Center Class WAN Optimization

p. 15 Sophos Antivirus, Security Software, Encryption, Data Protection

Page 3: Exclusive Networks Solutions Guide

- 3 -Solutions Guide

Pieter-Jan BlatonSecurity & Network [email protected]

Filip VandaeleSenior System [email protected]

Luk SchoonaertProduct Sales [email protected]

Jürgen De WolfMarketing & Business Development [email protected]

Kristiaan Van LoockFinancial [email protected]

Kris Van den BerghGeneral [email protected]

Koen de WitteSales [email protected]

Stefaan LerouxAccount [email protected]

Michael De VeylderInternal Sales [email protected]

Sofie VerelstInternal Sales [email protected]

Karen HoekProduct Sales Specialist [email protected]

Kelly Van der ZeypBackoffice & Order [email protected]

Your contacts at Exclusive Networks

Exclusive Networks specialises in security and networking solutions for the ‘Smarter Social Enterprise’ and trades with circa 5,000 reseller partners throughout Europe.

Exclusive Networks Group has become renowned for bringing innovative and disruptive technologies to the European marketplace. Since 2003 it has achieved significant growth and shared commercial success by providing accelerated go-to-market momentum for its vendor, integrator, VAR and service provider partners through consultancy, engineering, sales, marketing, training and technical support services.

Headquartered in France, Exclusive Networks Group is present in over 13 other countries including UK, Germany, Italy, Austria, the Netherlands, Belgium, Spain, Portugal, Sweden, Norway, and Finland and across Francophone Africa.

Exclusive Networks A. Stocletlaan 2022570 Duffel

tel: +32 (0)15 30 55 10fax: +32 (0)15 30 55 19

[email protected] www.exclusive-networks.be

Exclusive NetworksSpecialised in Security & Networking

About Exclusive Networks

Page 4: Exclusive Networks Solutions Guide

- 4 -Solutions Guide

A10 NetworksApplication Delivery & Load Balancing

Websiteswww.a10networks.comwww.exclusive-networks.be/vendors

About A10 NetworksA10 Networks makes innovative networking and security products that help networking, security, systems administration and help desk professionals improve their networks and streamline their IT operations. A10 Networks delivers high-performance solutions for application delivery, bandwidth management and network identity management.

The Solutions

n AX Series - Application Delivery ControllerThe AX Series is a new generation server load balancer with the industry’s best price/performance, helping enterprises and ISPs to scale and maximize application availability through the world’s most advanced application delivery platform

n EX Series - Bandwidth Management with Identity ReportingThe EX Series is the industry’s only bandwidth management appliance with identity-based reporting. The EX Series helps organizations secure, optimize and scale their network by managing bandwidth and traffic with unprecedented user visibili

n ID Series - Network Identity ManagementUsing a modular, agent-less approach, ID Series connects into multiple user directories, operating systems and networking devices, enabling a series of advanced identity management functionality.

The Benefits

n Maximize application availability, scalability & performance

n Increase Infrastructure efficiency

n Enhance end user experience

n Quality of Service

n Instant Application & User Visibilityt

n Link Load Balancing

Page 5: Exclusive Networks Solutions Guide

- 5 -Solutions Guide

Aerohive NetworksWireless Networking

About Aerohive NetworksAerohive Networks is pioneering a next-generation enterprise wireless LAN architecture. Aerohive’s cooperative control wireless LAN architecture eliminates wireless LAN controllers, providing all the management, mobility, and security of controller-based architectures without the cost, capacity, performance and availability issues associated with controller deployments. In addition, Aerohive solutions provide the reliability and scalability necessary for mission-critical networks and are optimized for voice

The Solutionsn Access Points

Aerohive’s 802.11n enterprise wireless LAN access points provide the benefits of a controller-based wireless LAN solution, without requiring a controller or an overlay network

n RoutersAerohive routers combine “work anywhere” mobility with enterprise routing functionality and complete security – all in a single device

n Network Management

Aerohive’s HiveOS is the operating system that powers the Aerohive access points and routers, while HiveManager is the network management system (NMS) for configuration and monitoring

n Cloud Services PlatformAerohive’s HiveOS is the operating system that powers the Aerohive access points and routers, while HiveManager is the network management system (NMS) for configuration and monitoring

n AppsApps such as StudentManager and TeacherView can help school districts monitor and track wireless clients, and GuestManager allows enterprises to provide sophisticated and secure access to guests

The Benefitsn Wireless 2.0 – controllerless solution

• No Central Controller which has to handle all Wireless Traffic• Intelligent AP’s which know the World around them

n Linear investment – flexible expansion

• No controller cost per N Access Points• Possible to add Access Points randomly without risk of reaching a controller limit

n More than an access point only• Integrated Firewall, VPN, Radius• Wireless IDS, Rogue Detection and Mitigation• Bandwidth Limit, QoS, SLA Compliance

n Management by HiveManager• HiveManager Online – Cloud Based Solution• Virtual HiveManager – Virtual Appliance• Physical HiveManager

Websiteswww.aerohive.comwww.exclusive-networks.be/vendors

Page 6: Exclusive Networks Solutions Guide

- 6 -Solutions Guide

Arbor Networks Network Monitoring and Security

About Arbor NetworksFrom the Internet data center edge to the service provider core, the world’s leading network operators and Internet service providers turn to Arbor Networks to proactively fend off malicious threats such as botnets and distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services. Arbor enables its customers to reduce costs by improving IPv4 and IPv6 traffic engineering, peering and other operational efficiencies.

The Solutionsn Arbor Pravail

The Pravail Availability Protection System (APS) from Arbor Networks focuses exclusively on stopping availability threats such as DDoS. Data center operators and enterprises can now deploy Pravail APS appliances to stop application-layer DDoS attacks and disrupt botnet communications at the enterprise or data center edge. They can also integrate Pravail APS upstream with their service providers’ DDoS protection services to stop volumetric DDoS attacks

n Arbor PeakflowWith best-in-class network security, visibility and analysis capabilities, Arbor Peakflow is the solution-of-choice for a majority of the world’s ISPs and many global enterprises

The Benefitsn Pervasive network visibility and security

• from the peering edge, through the backbone and clear to the customer aggregation edge of the provider’s network

n Cost-effective network monitoring• leveraging the IP flow technology already embedded in the network infrastructure

n Comprehensive threat management• proactively detect, analyze and classify network-wide anomalies such as DDoS attacks, botnets,

worms and other threats

n Increased availability• gaining a clear, network-wide view of operational issues, such as traffic and routing instability that

can reduce uptime and quality of service

n Improved traffic engineering and capacity planning• increase the performance and lower the cost of network infrastructures

n Next-generation managed services• DDoS detection/mitigation, MPLS VPN visibility/security and other revenue-generating services

n Active Threat Level Analysis System (ATLAS)• globally scoped threat analysis service, which protects network infrastructures and offers the

potential for managed information security services

Websiteswww.arbornetworks.comwww.exclusive-networks.be/vendors

Page 7: Exclusive Networks Solutions Guide

- 7 -Solutions Guide

FireEye Next Generation Threat Protection

Websiteswww.fireeye.comwww.exclusive-networks.be/vendors

About FireEyeFireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits, and APT tactics. FireEye solutions supplement traditional and next-generation firewalls, IPS, antivirus and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industry’s only solution that detects and blocks attacks across Web and email threat vectors as well as malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats.

The Solutionsn Malware Protection System (MPS)

The MPS is the only complete solution to stop advanced targeted attacks across the Web and email threat vectors and malware resident on file shares. FireEye’s solutions supplement traditional security defenses, such as traditional and next-generation firewalls, IPS, AV and gateways, which can’t stop advanced malware, thus leaving significant security holes in the majority of corporate networks

n Malware Analysis System (MAS)The MAS gives threat analysts hands-on control over powerful auto-configured test environments where they can safely execute and inspect advanced malware, zero-day, and targeted APT attacks embedded in common file formats, email attachments, and Web object

n Central Management System (CMS)The CMS consolidates the management, reporting, and data sharing of Web MPS, Email MPS, File MPS, and Malware Analysis System (MAS) in an easy-to-deploy, network-based appliance. The CMS enables real-time local distribution of malware security intelligence auto-generated within your FireEye deployment to stop advanced targeted attacks threatening the organization

n Malware Protection CloudMalware Protection Cloud interconnects FireEye appliances deployed within customer networks, technology partner networks, and service providers around the world. This worldwide cloud efficiently shares auto-generated malware security intelligence, such as covert callback channels, as well as new threat findings from the FireEye Malware Intelligence Lab

The Benefitsn Dynamic defenses to stop targeted, zero-day attacks

• Analyze network traffic to identify new and unknown attacks in real time

n Real-time protection to block data exfiltration attempts• Stop outbound callback communications to disrupt compromised systems from being controlled

and exploited from the external Command and Control servers

n Integrated inbound and outbound filtering across protocols• Take protective action across multiple protocols in both directions of communications

n Accurate, low false positive rates• Confirm malware through comprehensive, automated testing that avoids the flood of false alarms

n Global intelligence on advanced threats to protect the local network• Efficiently distribute newly confirmed malware intelligence, both within a site and across the

Internet

Page 8: Exclusive Networks Solutions Guide

- 8 -Solutions Guide

Fortinet Multi-Threat Security Systems for real-time Network Protection

Websiteswww.fortinet.comwww.exclusive-networks.be/vendors

About FortinetFortinet delivers unified threat management and specialized security solutions to protect against sophisticated network- and content-based threats. Fortinet is a market leader in network security, delivering purpose-built hardware and software that protects over 100,000 customers worldwide. Fortinet solutions improve performance, increase protection and visibility while reducing costs.

The Solutionsn Unified Threat Management (UTM)n Antispamn Antivirus/Antispywaren Application Controln Data Loss Prevention (DLP)n Database Securityn Firewalln Endpoint Protectionn Intrusion Prevention System (IPS)n IPv6n Virtual Private Network (VPN) - IPsec & SSLn Virtual Securityn Vulnerability and Compliance Managementn WAN Optimizationn Web Filteringn Web Application Securityn Wireless LAN (WLAN)

The Benefitsn UTM

• Identity Based Firewall, VPN (IPSEC/SSL), Dynamic Routing, Antivirus, Antispam, Web filtering, IPS, Application Control …

n ASIC Accelerated performance• FortiASIC Content Processor (CP) – Content Scan Acceleration, Pattern Match, IPSEC/SSL

Offloading FortiASIC Network Processor (NP) – Firewall, IPSEC VPN Acceleration• FortisASIC Security Processor (SP) – Additional IPS, Multicast, Unicast Acceleration

n Entire In-House Development of all Features• No integration of 3rd Parties• In House Developed + FortiASIC = Higher Performance

n Virtual Domain Architecture (VDOM)• From 10 up to 250 virtual instances per unit/blade

n Scalability• Appliances for small office, enterprise and ISP• Same Operation System (FortiOS) on all Appliances

n Virtual Appliances• ESX and ESXi Platform

Page 9: Exclusive Networks Solutions Guide

- 9 -Solutions Guide

Infoblox DNS, DHCP and IP Address Management

Websiteswww.infoblox.comwww.exclusive-networks.be/vendors

About InfobloxInfoblox is the market leader in automated network control and provides integrated DNS, DHCP, IP Address Management (IPAM) and Network Change & Configuration Management (NCCM) solution.

The Solutionsn Trinzic DDI

Trinzic DDI is an appliance-based network services software suite delivering state-of-the-art DNS, DHCP and IP address management (DDI), with seamless and agentless integration to Microsoft servers

n NetMRINetMRI automates network change, manages device configurations and enforces configuration compliance. NetMRI ensures business uptime by giving you control of network change, configurations, compliance, policy, health and network stability

n Infoblox GridThe patented Infoblox Grid sits at the heart of the most advanced, highly available, fault-tolerant and massively scalable network solutions in the world. When paired with the Multi-Grid Management architecture, Grid-based networks can support thousands of hosts, centralized management of IPv4 and IPv6 networks, single sign-on and other advanced capabilities

The Benefitsn Real-time IP Address Management

• Combining DNS, DHCP, IPAM in 1 appliance• Consolidate and automate core network services• Real-time visibility on IP endpoints

n Automated Network Change & Configuration Management• Reporting, Monitoring and Compliance

n Delegated Management• Powerful WEB GUI, custom roles

n Fully redundant GRID architecture• Comprehensive availability and disaster recovery• Shared Distributed Database

n Integrated with Microsoft DNS/DHCP and VMWARE

Page 10: Exclusive Networks Solutions Guide

- 10 -Solutions Guide

LogRhythm SIEM 2.0, Log & Event Management, Log Analysis

Websiteswww.logrhythm.comwww.exclusive-networks.be/vendors

About LogRhythmLogRhythm, the leader in log management and SIEM 2.0, delivers the visibility, insight and situational awareness needed for cyber threat defense, detection and response, compliance automation and assurance, and operational intelligence and optimization. LogRhythm uniquely analyzes and manages network, host, file and user activity data in a highly scalable, integrated solution. LogRhythm’s patented log management and SIEM 2.0 solution detects the previously undetectable, delivers powerful forensics and provides actionable intelligence.

The Solutions n Log Management & SIEM 2.0. | File Integrity Monitoring | Host Activity Monitoring

LogRhythm is an enterprise-class platform that seamlessly combines Log Management & SIEM 2.0, File Integrity Monitoring, and Host Activity Monitoring into a single integrated solution. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

LogRhythm’s SIEM 2.0 platform delivers:

• Fully Integrated Log & Event Management• Correlation and Pattern Recognition• Extended Visibility and Context

- Independent Host Activity Monitoring- File Activity Monitoring- Enterprise-wide Network Visibility

• Powerful, Rapid Forensics• Intelligent, Process-Driven SmartResponse• Ease-of-use and Simplified Management

The Benefits n Expand and accelerate threat detection & response capabilitiesn Reduce acquisition costs and management overheadn Automate compliancen Increase ROI

Page 11: Exclusive Networks Solutions Guide

- 11 -Solutions Guide

Nimble Storage Flash Optimized Hybrid Storage

Websiteswww.nimblestorage.comwww.exclusive-networks.be/vendors

About Nimble StorageNimble Storage believes enterprises should not have to compromise on performance, capacity, ease of use, or price. Nimble has developed the first hybrid storage architecture engineered from the ground up to seamlessly integrate flash and high-capacity drives. Our customers enjoy as much as 10x faster application performance, enhanced backup and disaster recovery, and stress-free operations—all while lowering their TCO. Nimble Storage solutions are available through a global network of world-class channel partners.

The Solutions n CS200 Series

The CS200 Series is ideal for midsize IT organizations or distributed sites of larger organizations, supporting workloads such as Microsoft applications, VDI, or virtual server consolidation.

n CS400 SeriesThe CS400 Series delivers higher performance and is ideal for larger-scale deployments or IO-intensive workloads, such as larger scale VDI or transaction processing supported by Oracle or SQL Server.

The Benefits n Primary and backup storage in a single solutionn Boost the performance of all your applications, including Microsoft Exchange, SQL Server, and VDI, with sub-millisecond latencies.n Maximize capacity and store more data with in-line compression, thin provisioning, and efficient cloning.n Eliminate silos and scale storage performance and capacity to fit application requirements and budgets—accomplished by adding compute, cache, or capacity or by scaling-outn Keep storage and applications up and running with frequent snapshots and consistent backups, fast restores, and efficient replication for disaster recovery.n Maximize capacity and store more data with in-line compression, thin provisioning, and efficient cloning.n Simplify management with push-button deployment, integration with familiar tools such as VMware vCenter, and proactive monitoring.

Page 12: Exclusive Networks Solutions Guide

- 12 -Solutions Guide

Nutanix Compute - Storage - Complete

Websiteswww.nutanix.comwww.exclusive-networks.be/vendors

About NutanixNutanix brings forth an exciting new SAN-less virtualized datacenter platform, converging two tiers of infrastructure down to one. Through the use of innovative server-attached PCIe Flash and high capacity SATA drives, Nutanix’ innovative distributed storage and compute cluster localizes the data-path for higher performance and reduced complexity. Inspired by SAN-less distributed systems employed by Google, Amazon, Facebook, and Twitter, Nutanix is first to market with an enterprise-friendly, easy to deploy storage and compute cluster that dynamically grows to meet business demands.

The Solutions n Nutanix Complete Cluster

Nutanix enables you to virtualize your datacenter without requiring a SAN. Our mission is to make virtualization simple by eliminating the need for network storage while still delivering the enterprise-class performance, scalability and data management features you need.

Nutanix Complete Cluster’s converged compute and storage architecture delivers a purpose-built building block for virtualization. It is a hardware and software solution that provides complete server and storage capabilities that you need to run virtual machines and store their data. This building block approach allows you to start with what you need now and add additional blocks as your needs grow to scale-out a single system.

Less time and money spent on network storage means faster ROI for your virtualization initiatives and better use of your IT resources.

The Benefits n Scalable High-Performance Application Publishing and Desktop Virtualization n Lower CAPEX than physical desktops with SAN-less architecture for VDI n Avoid overprovisioning expensive storage to get the remote application performance you need n Fast provisioning of virtual desktops using Nutanix FastClone n Seamless Enterprise Virtualization Supportn Delivering Virtualized Infrastructure as a Servicen Lowest Enterprise-class DR TCO

Page 13: Exclusive Networks Solutions Guide

- 13 -Solutions Guide

Proofpoint Data Protection Solutions

Websiteswww.proofpoint.comwww.exclusive-networks.be/vendors

About ProofpointProofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help medium- and large-sized organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches.

Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2012 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform.

The Solutions Proofpoint has four main offerings. Used together, these enterprise email solutions enable organizations to: keep malicious content out of their environments; prevent the theft or inadvertent loss of sensitive email data; ensure email archiving compliance with regulatory data protection mandates; collect, securely retain, govern and discover sensitive data for compliance and litigation support; and securely communicate and collabo-rate on sensitive data with customers, partners and suppliers. Just as importantly, our enterprise email solu-tions are designed to work effectively even in today’s world of empowered end-users and proliferating data.

n Proofpoint Enterprise Protectionn Proofpoint Enterprise Privacyn Proofpoint Enterprise Archiven Proofpoint Enterprise Governance

The Benefits n You gain superior protection against today’s advanced, targeted threatsn You gain secure communication and collaborationn You gain a lower total cost of ownership n You gain an extensible security-as-a-service platform

Page 14: Exclusive Networks Solutions Guide

- 14 -Solutions Guide

Silver PeakData Center Class WAN Optimization

Websiteswww.silver-peak.comwww.exclusive-networks.be/vendors

About Silver Peak Silver Peak develops data center class WAN optimization physical and virtual appliances that maximize WAN performance while minimizing WAN costs. The company’s unique network approach to WAN optimization delivers unprecedented scalability and flexibility, making Silver Peak’s WAN optimization solution a strategic enabler for key IT initiatives, including data center consolidation, data migration, disaster recovery, server centralization, and global application / desktop virtualization.

The Solutionsn Virtual Acceleration Open Architecture (VXOA)

WAN optimization software used on all Silver Peak NX, VX and VRX products. It includes advanced features for integration with 3rd party products like routers, switches, servers, and storage arrays, and flexible pricing options for easy WAN optimization deployment

n NX AppliancesStandalone devices that seamlessly fit into any enterprise network, sitting between network resources and the WAN infrastructure that is used to connect them to remote users. Deployment of NX appliances requires absolutely no client, server, or application reconfiguration

n VX AppliancesSoftware-only versions of NX appliances. They support all the same VXOA features as their NX counterparts, but in a virtualized manner. By deploying Silver Peak’s VX family of appliances on industry standard servers, enterprises reap all the cost and flexibility benefits of server virtualization

n VRX AppliancesVirtual WAN optimization devices designed specifically for data center deployment. They deliver the highest end-to-end throughput and simultaneous sessions of any virtual WAN optimization device and are proven compatible with all leading storage solutions and data center switching devices

n Global ManagementA powerful platform for the deployment, management, and monitoring of a Silver Peak-enabled Wide Area Network (WAN). GMS gives IT managers detailed visibility into all aspects of application delivery across a distributed enterprise, including WAN performance statistics, application analysis, and tools for the configuration and management of Silver Peak NX Series appliances

The Benefitsn Optimizes all IP traffic (L3 and above)

• Any protocol, any application – TCP, UDP Fiber over Ethernet

n Network Memory - bandwidth• Real-time de-duplication of ALL IP WAN traffic at BYTE level

n Network Integrity - loss• Forward Error Checking & Packet Order Correction

n Network Acceleration & QoS – latency

n High Performance• Smallest Appliance 8.000 flows, up to 256.000 flows

n Virtual appliances (VRX)• 1Gbps LAN/WAN Throughput, 1.000 flows

Page 15: Exclusive Networks Solutions Guide

- 15 -Solutions Guide

SophosAntivirus, Security Software, Encryption, Data Protection

Websiteswww.sophos.comwww.exclusive-networks.be/vendors

About Sophos

Sophos provides a full range of endpoint, encryption, email, web and NAC solutions that are simple to deploy, manage and use. Sophos powerful solutions deploy easily, require minimal management and are simple to use. And all Sophos customers benefit from SophosLabs, the core of Sophos expertise, which has the fastest response in the industry to emerging threats.

The Solutions

n Unified Threat Management (UTM)Complete security to protect your network, web and email in one integrated appliance

n Data EncryptionSecure your confidential information and help you comply with regulations

n Email Security and Data ProtectionEncrypt your sensitive email, prevent data loss and block spam

n Network ProtectionKeep your network infrastructure secure and safe with simple, unified control

n Endpoint ProtectionKeep data in and malware out

n Web ProtectionMake using the Internet safer and more productive

n Mobile ControlEasily protect, secure and manage your mobile devices and data

The Benefits

n Business Market product only

n Widest range of platform support• All Windows Platforms• Mac OS X/Linux/UNIX/NetApp Storage Systems/EMC/OpenVMS/ NetWare• Single Management Console for Windows, Linux and Mac

n Support• 24x7 Call Support as a Standard• Direct Access to Sophos Experts speaking local language

n Complete and recognized product line• Sophos Endpoint Security : Leader in Magic Quadrant• Sophos NAC : Highly Rated in Gartner NAC Marketscope• Sophos (Utimaco) : Leader in Magic Quadrant for Mobile Data Protection