You are on page 1of 15

Solutions Guide 2013

Value Add Distributor specialised in

Comprehensive overview of Exclusive Networks product range

Security, Networking & Storage

Content
Exclusive Networks Solutions Guide

Table of Contents
p. 3 P. 4 p. 5 p. 6 Exclusive Networks About Exclusive Networks, your contacts at Exclusive Networks A10 Networks A strategic vision on Application, Desktop, Server and Storage virtualization Aerohive Networks Wireless Networking Arbor Networks Network Monitoring and Security Exclusive Networks A. Stocletlaan 202 2570 Duffel tel: +32 (0)15 30 55 10 fax: +32 (0)15 30 55 19 info@exclusive-networks.be www.exclusive-networks.be

p.7 FireEye Next Generation Threat Protection p. 8 p. 9 p. 10 p. 11 p. 12 p. 13 p. 14 p. 15 Fortinet Multi-Threat Security Systems for real-time Network Protection Infoblox DNS, DHCP and IP Address Management LogRhythm SIEM 2.0, Log & Event Management, Log Analysis Nimble Storage Flash Optimized Hybrid Storage Nutanix Compute & Storage Cluster Proofpoint Data Protection Solutions Silver Peak Data Center Class WAN Optimization Sophos Antivirus, Security Software, Encryption, Data Protection

Solutions Guide

- 2 -

Exclusive Networks
Specialised in Security & Networking

About Exclusive Networks


Exclusive Networks specialises in security and networking solutions for the Smarter Social Enterprise and trades with circa 5,000 reseller partners throughout Europe. Exclusive Networks Group has become renowned for bringing innovative and disruptive technologies to the European marketplace. Since 2003 it has achieved significant growth and shared commercial success by providing accelerated go-to-market momentum for its vendor, integrator, VAR and service provider partners through consultancy, engineering, sales, marketing, training and technical support services. Headquartered in France, Exclusive Networks Group is present in over 13 other countries including UK, Germany, Italy, Austria, the Netherlands, Belgium, Spain, Portugal, Sweden, Norway, and Finland and across Francophone Africa. Exclusive Networks A. Stocletlaan 202 2570 Duffel tel: +32 (0)15 30 55 10 fax: +32 (0)15 30 55 19 info@exclusive-networks.be www.exclusive-networks.be

Your contacts at Exclusive Networks


Koen de Witte Sales Manager kdewitte@exclusive-networks.be Pieter-Jan Blaton Security & Network Engineer pblaton@exclusive-networks.be

Stefaan Leroux Account Manager sleroux@exclusive-networks.be

Filip Vandaele Senior System Engineer fvandaele@exclusive-networks.be

Michael De Veylder Internal Sales Representative mdeveylder@exclusive-networks.be

Luk Schoonaert Product Sales Specialist luks@exclusive-networks.be

Sofie Verelst Internal Sales Represenative sverelst@exclusive-networks.be

Jrgen De Wolf
Marketing & Business Development Manager

jdewolf@exclusive-networks.be

Karen Hoek Product Sales Specialist Fortinet khoek@exclusive-networks.be

Kristiaan Van Loock Financial Manager kvanloock@exclusive-networks.be

Kelly Van der Zeyp Backoffice & Order Processing kvanderzeyp@exclusive-networks.be

Kris Van den Bergh General Manager kvdbergh@exclusive-networks.be

Solutions Guide

- 3 -

A10 Networks
Application Delivery & Load Balancing

About A10 Networks


A10 Networks makes innovative networking and security products that help networking, security, systems administration and help desk professionals improve their networks and streamline their IT operations. A10 Networks delivers high-performance solutions for application delivery, bandwidth management and network identity management. Websites www.a10networks.com www.exclusive-networks.be/vendors

The Solutions
n AX Series - Application Delivery Controller The AX Series is a new generation server load balancer with the industrys best price/performance, helping enterprises and ISPs to scale and maximize application availability through the worlds most advanced application delivery platform

n EX Series - Bandwidth Management with Identity Reporting The EX Series is the industrys only bandwidth management appliance with identity-based reporting. The EX Series helps organizations secure, optimize and scale their network by managing bandwidth and traffic with unprecedented user visibili n ID Series - Network Identity Management Using a modular, agent-less approach, ID Series connects into multiple user directories, operating systems and networking devices, enabling a series of advanced identity management functionality.

The Benefits
n Maximize application availability, scalability & performance n Increase Infrastructure efficiency n Enhance end user experience n Quality of Service n Instant Application & User Visibilityt n Link Load Balancing

Solutions Guide

- 4 -

Aerohive Networks
Wireless Networking

About Aerohive Networks


Aerohive Networks is pioneering a next-generation enterprise wireless LAN architecture. Aerohives cooperative control wireless LAN architecture eliminates wireless LAN controllers, providing all the management, mobility, and security of controller-based architectures without the cost, capacity, performance and availability issues associated with controller deployments. In addition, Aerohive solutions provide the reliability and scalability necessary for mission-critical networks and are optimized for voice Websites www.aerohive.com www.exclusive-networks.be/vendors

The Solutions
n Access Points Aerohives 802.11n enterprise wireless LAN access points provide the benefits of a controller-based wireless LAN solution, without requiring a controller or an overlay network n Routers Aerohive routers combine work anywhere mobility with enterprise routing functionality and complete security all in a single device n Network Management Aerohives HiveOS is the operating system that powers the Aerohive access points and routers, while HiveManager is the network management system (NMS) for configuration and monitoring n Cloud Services Platform Aerohives HiveOS is the operating system that powers the Aerohive access points and routers, while HiveManager is the network management system (NMS) for configuration and monitoring n Apps Apps such as StudentManager and TeacherView can help school districts monitor and track wireless clients, and GuestManager allows enterprises to provide sophisticated and secure access to guests

The Benefits
n Wireless 2.0 controllerless solution No Central Controller which has to handle all Wireless Traffic Intelligent APs which know the World around them n Linear investment flexible expansion No controller cost per N Access Points Possible to add Access Points randomly without risk of reaching a controller limit n More than an access point only Integrated Firewall, VPN, Radius Wireless IDS, Rogue Detection and Mitigation Bandwidth Limit, QoS, SLA Compliance n Management by HiveManager HiveManager Online Cloud Based Solution Virtual HiveManager Virtual Appliance Physical HiveManager

Solutions Guide

- 5 -

Arbor Networks
Network Monitoring and Security

About Arbor Networks


From the Internet data center edge to the service provider core, the worlds leading network operators and Internet service providers turn to Arbor Networks to proactively fend off malicious threats such as botnets and distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services. Arbor enables its customers to reduce costs by improving IPv4 and IPv6 traffic engineering, peering and other operational efficiencies. Websites www.arbornetworks.com www.exclusive-networks.be/vendors

The Solutions
n Arbor Pravail The Pravail Availability Protection System (APS) from Arbor Networks focuses exclusively on stopping availability threats such as DDoS. Data center operators and enterprises can now deploy Pravail APS appliances to stop application-layer DDoS attacks and disrupt botnet communications at the enterprise or data center edge. They can also integrate Pravail APS upstream with their service providers DDoS protection services to stop volumetric DDoS attacks n Arbor Peakflow With best-in-class network security, visibility and analysis capabilities, Arbor Peakflow is the solution-of-choice for a majority of the worlds ISPs and many global enterprises

The Benefits
n Pervasive network visibility and security from the peering edge, through the backbone and clear to the customer aggregation edge of the providers network n Cost-effective network monitoring leveraging the IP flow technology already embedded in the network infrastructure n Comprehensive threat management proactively detect, analyze and classify network-wide anomalies such as DDoS attacks, botnets, worms and other threats n Increased availability gaining a clear, network-wide view of operational issues, such as traffic and routing instability that can reduce uptime and quality of service n Improved traffic engineering and capacity planning increase the performance and lower the cost of network infrastructures n Next-generation managed services DDoS detection/mitigation, MPLS VPN visibility/security and other revenue-generating services n Active Threat Level Analysis System (ATLAS) globally scoped threat analysis service, which protects network infrastructures and offers the potential for managed information security services Solutions Guide
- 6 -

FireEye
Next Generation Threat Protection

About FireEye
FireEye is the leader in stopping advanced targeted attacks that use advanced malware, zero-day exploits, and APT tactics. FireEye solutions supplement traditional and next-generation firewalls, IPS, antivirus and gateways, which cannot stop advanced threats, leaving security holes in networks. FireEye offers the industrys only solution that detects and blocks attacks across Web and email threat vectors as well as malware resident on file shares. It addresses all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis to detect zero-day threats.

Websites
www.fireeye.com www.exclusive-networks.be/vendors

The Solutions
n Malware Protection System (MPS) The MPS is the only complete solution to stop advanced targeted attacks across the Web and email threat vectors and malware resident on file shares. FireEyes solutions supplement traditional security defenses, such as traditional and next-generation firewalls, IPS, AV and gateways, which cant stop advanced malware, thus leaving significant security holes in the majority of corporate networks n Malware Analysis System (MAS) The MAS gives threat analysts hands-on control over powerful auto-configured test environments where they can safely execute and inspect advanced malware, zero-day, and targeted APT attacks embedded in common file formats, email attachments, and Web object n Central Management System (CMS) The CMS consolidates the management, reporting, and data sharing of Web MPS, Email MPS, File MPS, and Malware Analysis System (MAS) in an easy-to-deploy, network-based appliance. The CMS enables real-time local distribution of malware security intelligence autogenerated within your FireEye deployment to stop advanced targeted attacks threatening the organization n Malware Protection Cloud Malware Protection Cloud interconnects FireEye appliances deployed within customer networks, technology partner networks, and service providers around the world. This worldwide cloud efficiently shares auto-generated malware security intelligence, such as covert callback channels, as well as new threat findings from the FireEye Malware Intelligence Lab

The Benefits
n Dynamic defenses to stop targeted, zero-day attacks Analyze network traffic to identify new and unknown attacks in real time n Real-time protection to block data exfiltration attempts Stop outbound callback communications to disrupt compromised systems from being controlled and exploited from the external Command and Control servers n Integrated inbound and outbound filtering across protocols Take protective action across multiple protocols in both directions of communications n Accurate, low false positive rates Confirm malware through comprehensive, automated testing that avoids the flood of false alarms n Global intelligence on advanced threats to protect the local network Efficiently distribute newly confirmed malware intelligence, both within a site and across the Internet

Solutions Guide

- 7 -

Fortinet
Multi-Threat Security Systems for real-time Network Protection

About Fortinet
Fortinet delivers unified threat management and specialized security solutions to protect against sophisticated network- and content-based threats. Fortinet is a market leader in network security, delivering purpose-built hardware and software that protects over 100,000 customers worldwide. Fortinet solutions improve performance, increase protection and visibility while reducing costs.

Websites
www.fortinet.com www.exclusive-networks.be/vendors

The Solutions
n n n n n n n n n n n n n n n n n Unified Threat Management (UTM) Antispam Antivirus/Antispyware Application Control Data Loss Prevention (DLP) Database Security Firewall Endpoint Protection Intrusion Prevention System (IPS) IPv6 Virtual Private Network (VPN) - IPsec & SSL Virtual Security Vulnerability and Compliance Management WAN Optimization Web Filtering Web Application Security Wireless LAN (WLAN)

The Benefits
n UTM Identity Based Firewall, VPN (IPSEC/SSL), Dynamic Routing, Antivirus, Antispam, Web filtering, IPS, Application Control n ASIC Accelerated performance FortiASIC Content Processor (CP) Content Scan Acceleration, Pattern Match, IPSEC/SSL Offloading FortiASIC Network Processor (NP) Firewall, IPSEC VPN Acceleration FortisASIC Security Processor (SP) Additional IPS, Multicast, Unicast Acceleration n Entire In-House Development of all Features No integration of 3rd Parties In House Developed + FortiASIC = Higher Performance n Virtual Domain Architecture (VDOM) From 10 up to 250 virtual instances per unit/blade n Scalability Appliances for small office, enterprise and ISP Same Operation System (FortiOS) on all Appliances n Virtual Appliances ESX and ESXi Platform

Solutions Guide

- 8 -

Infoblox
DNS, DHCP and IP Address Management

About Infoblox
Infoblox is the market leader in automated network control and provides integrated DNS, DHCP, IP Address Management (IPAM) and Network Change & Configuration Management (NCCM) solution.

Websites
www.infoblox.com www.exclusive-networks.be/vendors

The Solutions
n Trinzic DDI Trinzic DDI is an appliance-based network services software suite delivering state-of-the-art DNS, DHCP and IP address management (DDI), with seamless and agentless integration to Microsoft servers n NetMRI NetMRI automates network change, manages device configurations and enforces configuration compliance. NetMRI ensures business uptime by giving you control of network change, configurations, compliance, policy, health and network stability n Infoblox Grid The patented Infoblox Grid sits at the heart of the most advanced, highly available, fault-tolerant and massively scalable network solutions in the world. When paired with the Multi-Grid Management architecture, Grid-based networks can support thousands of hosts, centralized management of IPv4 and IPv6 networks, single sign-on and other advanced capabilities

The Benefits
n Real-time IP Address Management Combining DNS, DHCP, IPAM in 1 appliance Consolidate and automate core network services Real-time visibility on IP endpoints n Automated Network Change & Configuration Management Reporting, Monitoring and Compliance n Delegated Management Powerful WEB GUI, custom roles n Fully redundant GRID architecture Comprehensive availability and disaster recovery Shared Distributed Database n Integrated with Microsoft DNS/DHCP and VMWARE

Solutions Guide

- 9 -

LogRhythm
SIEM 2.0, Log & Event Management, Log Analysis

About LogRhythm
LogRhythm, the leader in log management and SIEM 2.0, delivers the visibility, insight and situational awareness needed for cyber threat defense, detection and response, compliance automation and assurance, and operational intelligence and optimization. LogRhythm uniquely analyzes and manages network, host, file and user activity data in a highly scalable, integrated solution. LogRhythms patented log management and SIEM 2.0 solution detects the previously undetectable, delivers powerful forensics and provides actionable intelligence.

Websites
www.logrhythm.com www.exclusive-networks.be/vendors

The Solutions
n Log Management & SIEM 2.0. | File Integrity Monitoring | Host Activity Monitoring LogRhythm is an enterprise-class platform that seamlessly combines Log Management & SIEM 2.0, File Integrity Monitoring, and Host Activity Monitoring into a single integrated solution. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment. LogRhythms SIEM 2.0 platform delivers: Fully Integrated Log & Event Management Correlation and Pattern Recognition Extended Visibility and Context - Independent Host Activity Monitoring - File Activity Monitoring - Enterprise-wide Network Visibility Powerful, Rapid Forensics Intelligent, Process-Driven SmartResponse Ease-of-use and Simplified Management

The Benefits
n n n n Expand and accelerate threat detection & response capabilities Reduce acquisition costs and management overhead Automate compliance Increase ROI

Solutions Guide

- 10 -

Nimble Storage
Flash Optimized Hybrid Storage

About Nimble Storage


Nimble Storage believes enterprises should not have to compromise on performance, capacity, ease of use, or price. Nimble has developed the first hybrid storage architecture engineered from the ground up to seamlessly integrate flash and high-capacity drives. Our customers enjoy as much as 10x faster application performance, enhanced backup and disaster recovery, and stress-free operationsall while lowering their TCO. Nimble Storage solutions are available through a global network of world-class channel partners.

Websites
www.nimblestorage.com www.exclusive-networks.be/vendors

The Solutions
n CS200 Series The CS200 Series is ideal for midsize IT organizations or distributed sites of larger organizations, supporting workloads such as Microsoft applications, VDI, or virtual server consolidation. n CS400 Series The CS400 Series delivers higher performance and is ideal for larger-scale deployments or IO-intensive workloads, such as larger scale VDI or transaction processing supported by Oracle or SQL Server.

The Benefits
n Primary and backup storage in a single solution n Boost the performance of all your applications, including Microsoft Exchange, SQL Server, and VDI, with sub-millisecond latencies. n Maximize capacity and store more data with in-line compression, thin provisioning, and efficient cloning. n Eliminate silos and scale storage performance and capacity to fit application requirements and budgetsaccomplished by adding compute, cache, or capacity or by scaling-out n Keep storage and applications up and running with frequent snapshots and consistent backups, fast restores, and efficient replication for disaster recovery. n Maximize capacity and store more data with in-line compression, thin provisioning, and efficient cloning. n Simplify management with push-button deployment, integration with familiar tools such as VMware vCenter, and proactive monitoring.

Solutions Guide

- 11 -

Nutanix
Compute - Storage - Complete

About Nutanix
Nutanix brings forth an exciting new SAN-less virtualized datacenter platform, converging two tiers of infrastructure down to one. Through the use of innovative server-attached PCIe Flash and high capacity SATA drives, Nutanix innovative distributed storage and compute cluster localizes the data-path for higher performance and reduced complexity. Inspired by SAN-less distributed systems employed by Google, Amazon, Facebook, and Twitter, Nutanix is first to market with an enterprise-friendly, easy to deploy storage and compute cluster that dynamically grows to meet business demands.

Websites
www.nutanix.com www.exclusive-networks.be/vendors

The Solutions
n Nutanix Complete Cluster Nutanix enables you to virtualize your datacenter without requiring a SAN. Our mission is to make virtualization simple by eliminating the need for network storage while still delivering the enterpriseclass performance, scalability and data management features you need. Nutanix Complete Clusters converged compute and storage architecture delivers a purpose-built building block for virtualization. It is a hardware and software solution that provides complete server and storage capabilities that you need to run virtual machines and store their data. This building block approach allows you to start with what you need now and add additional blocks as your needs grow to scale-out a single system. Less time and money spent on network storage means faster ROI for your virtualization initiatives and better use of your IT resources.

The Benefits
n n n n n n n Scalable High-Performance Application Publishing and Desktop Virtualization Lower CAPEX than physical desktops with SAN-less architecture for VDI Avoid overprovisioning expensive storage to get the remote application performance you need Fast provisioning of virtual desktops using Nutanix FastClone Seamless Enterprise Virtualization Support Delivering Virtualized Infrastructure as a Service Lowest Enterprise-class DR TCO

Solutions Guide

- 12 -

Proofpoint
Data Protection Solutions

About Proofpoint
Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help medium- and large-sized organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches. Proofpoint, positioned by Gartner in the Leaders Quadrant in its 2012 Magic Quadrant for Secure Email Gateways, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communicationsall of which are based on a common security-as-a-service platform.

Websites
www.proofpoint.com www.exclusive-networks.be/vendors

The Solutions
Proofpoint has four main offerings. Used together, these enterprise email solutions enable organizations to: keep malicious content out of their environments; prevent the theft or inadvertent loss of sensitive email data; ensure email archiving compliance with regulatory data protection mandates; collect, securely retain, govern and discover sensitive data for compliance and litigation support; and securely communicate and collaborate on sensitive data with customers, partners and suppliers. Just as importantly, our enterprise email solutions are designed to work effectively even in todays world of empowered end-users and proliferating data. n n n n Proofpoint Enterprise Protection Proofpoint Enterprise Privacy Proofpoint Enterprise Archive Proofpoint Enterprise Governance

The Benefits
n n n n You gain superior protection against todays advanced, targeted threats You gain secure communication and collaboration You gain a lower total cost of ownership You gain an extensible security-as-a-service platform

Solutions Guide

- 13 -

Silver Peak
Data Center Class WAN Optimization

About Silver Peak


Silver Peak develops data center class WAN optimization physical and virtual appliances that maximize WAN performance while minimizing WAN costs. The companys unique network approach to WAN optimization delivers unprecedented scalability and flexibility, making Silver Peaks WAN optimization solution a strategic enabler for key IT initiatives, including data center consolidation, data migration, disaster recovery, server centralization, and global application / desktop virtualization.

Websites
www.silver-peak.com www.exclusive-networks.be/vendors

The Solutions
n Virtual Acceleration Open Architecture (VXOA) WAN optimization software used on all Silver Peak NX, VX and VRX products. It includes advanced features for integration with 3rd party products like routers, switches, servers, and storage arrays, and flexible pricing options for easy WAN optimization deployment n NX Appliances Standalone devices that seamlessly fit into any enterprise network, sitting between network resources and the WAN infrastructure that is used to connect them to remote users. Deployment of NX appliances requires absolutely no client, server, or application reconfiguration n VX Appliances Software-only versions of NX appliances. They support all the same VXOA features as their NX counterparts, but in a virtualized manner. By deploying Silver Peaks VX family of appliances on industry standard servers, enterprises reap all the cost and flexibility benefits of server virtualization n VRX Appliances Virtual WAN optimization devices designed specifically for data center deployment. They deliver the highest end-to-end throughput and simultaneous sessions of any virtual WAN optimization device and are proven compatible with all leading storage solutions and data center switching devices n Global Management A powerful platform for the deployment, management, and monitoring of a Silver Peak-enabled Wide Area Network (WAN). GMS gives IT managers detailed visibility into all aspects of application delivery across a distributed enterprise, including WAN performance statistics, application analysis, and tools for the configuration and management of Silver Peak NX Series appliances

The Benefits
n Optimizes all IP traffic (L3 and above) Any protocol, any application TCP, UDP Fiber over Ethernet n Network Memory - bandwidth Real-time de-duplication of ALL IP WAN traffic at BYTE level n Network Integrity - loss Forward Error Checking & Packet Order Correction n Network Acceleration & QoS latency n High Performance Smallest Appliance 8.000 flows, up to 256.000 flows n Virtual appliances (VRX) 1Gbps LAN/WAN Throughput, 1.000 flows Solutions Guide
- 14 -

Sophos
Antivirus, Security Software, Encryption, Data Protection

About Sophos
Sophos provides a full range of endpoint, encryption, email, web and NAC solutions that are simple to deploy, manage and use. Sophos powerful solutions deploy easily, require minimal management and are simple to use. And all Sophos customers benefit from SophosLabs, the core of Sophos expertise, which has the fastest response in the industry to emerging threats.

Websites
www.sophos.com www.exclusive-networks.be/vendors

The Solutions
n Unified Threat Management (UTM) Complete security to protect your network, web and email in one integrated appliance n Data Encryption Secure your confidential information and help you comply with regulations n Email Security and Data Protection Encrypt your sensitive email, prevent data loss and block spam n Network Protection Keep your network infrastructure secure and safe with simple, unified control n Endpoint Protection Keep data in and malware out n Web Protection Make using the Internet safer and more productive n Mobile Control Easily protect, secure and manage your mobile devices and data

The Benefits
n Business Market product only n Widest range of platform support All Windows Platforms Mac OS X/Linux/UNIX/NetApp Storage Systems/EMC/OpenVMS/ NetWare Single Management Console for Windows, Linux and Mac n Support 24x7 Call Support as a Standard Direct Access to Sophos Experts speaking local language n Complete and recognized product line Sophos Endpoint Security : Leader in Magic Quadrant Sophos NAC : Highly Rated in Gartner NAC Marketscope Sophos (Utimaco) : Leader in Magic Quadrant for Mobile Data Protection

Solutions Guide

- 15 -

You might also like