Professional Documents
Culture Documents
2011 is an exciting year for e92plus, as we build on three successive years of growth.
We were delighted to end 2010 on a high after being awarded the prestigious
title of Security Distributor of the Year at the CRN Awards - so a big thank you to
everyone for your support!
We also welcome new vendor partners on board, including innovative storage from Drobo, desktop virtualisation
from LG and advanced network reporting from WebSpy.
Don‟t forget, SecurityPlus is unique to e92plus - and is available to our reseller partners with your own branding as
part of a full marketing campaign. If you are interested in taking part, email us at securityplus@e92plus.com.
Mukesh Gupta
Managing Director of e92plus
Page 2
Infosecurity Europe 2011
19-21st April, Earls Court, London
Infosecurity is Europe's most comprehensive gathering of information
security professionals, located at Earls Court. Showcasing the most diverse
range of new and innovative products and services, and addressing today's
strategic and technical issues in an unrivalled free-to-attend education
programme.
Many of our leading vendors will be at the event - and it‟s an ideal
opportunity for you to visit their stands, see the latest technology and
learn more about the great opportunities available.
Avira will be attending Infosecurity Come and visit the Barracuda Celestix will be showcasing their
Europe for the first time this year, stand for a hands-on new HOTPin 2FA and BSA
promoting their Anti Virus demonstration of their unique solutions. You can also enjoy a
technology and their new hosted Backup Service, and get updated live demonstration of Microsoft
email security solution. on the rest of product range. TMG & UAG in action.
Come and see Drobo‟s range of Visit Vasco for the perfect solution Websense will be demonstrating
award-winning data storage for integrated remote access, web their new Email Security Gateway
products that provide unrivalled application and network log on solution which completes their
data protection, management authentication. TRITON interface, combining web,
features and ease-of-use. email and data solutions.
Page 3
To share or not to share:
Is your sensitive corporate data secure?
In today‟s world, mission critical What’s the real impact of data This also means that additional
data needs to be shared quickly leakage? layers of security can be
and securely. The increasing introduced, enhancing the data
requirement to send information In a recent survey conducted by owner‟s ability to control what can
between users all across the globe Forrester titled “The Value of happen to the information, who can
means that sensitive data is Corporate Secrets”, the associated access it, when they can access it
constantly at risk. With the rising cost of a data leak derived from a and where. With these parameters
sophistication and frequency of rogue employee stealing sensitive in place, companies can define
threats, it‟s essential that company documents was estimated everything needed to ensure
information is secured no matter to be at least £250,000. Meanwhile information security both internally
where it is, how it‟s sent, or who the cost of a data leak from an and externally to the business
it‟s being shared with. outside business partner losing or whilst still remaining flexible and
abusing sensitive information was with enough granularities to cope
The Challenge over £75,000 per incident. with the many different levels of
access different parties need.
A critical part of today‟s business Breaches of data security don‟t just
operations is the efficient sharing have direct financial impact. They Introducing Celestix BSA
and distribution of information can also lead to bad press, lower
between employees and non- customer confidence, brand and As a global leader in securing
employees such as contractors, reputation damage and potential business information, Celestix
vendors or partners. Organisations fines imposed by regulatory Networks is bringing to market the
depend upon users being able to authorities. BSA appliance to specifically
collaborate easily and share address the critical data protection
information quickly. The challenge Think Data-Centric Security challenges businesses face.
is how to easily secure sensitive Celestix BSA is an integrated
information whilst making it Securing your network, devices and appliance solution that delivers:
available to legitimate users when applications is one step in the
and where they need it. overall security chain – but what Information Rights
For example, attaching a about securing the data itself? Management – ensuring the
confidential document to an email Encrypting an entire laptop doesn‟t right people get the right level of
is an easy and efficient way of help to protect data when being access to the appropriate files.
transferring information, but how shared: it only addresses the loss
secure is it? If the document is of the device and data at rest, and Secure Managed File Transfer
highly confidential and contains does not help in securing data that - industry leading 2048-bit
valuable information, what needs to be shared in order to be encryption applied to both the
protection methods are used whilst used effectively. transfer and to the file itself.
the file is in transit, and after it‟s
Persistent Data File
received? The result of insufficient Transmitting data securely from
Encryption – Protection applied
data protection methods can result point A to point B is just one step in
to any file type, any transport
in damaging data leakage. its journey – but what happens
method and whilst in storage.
when it reaches point B, the
recipient? How do you ensure that Auditing & Compliance
the data, now it has safely reached Reporting – Supports
its destination, is only accessed by regulatory compliance by
the recipient you want to access it providing reporting and audit
and not by anyone else? To use the trail functions of the file
information it has to be opened in a activities.
decrypted state, leaving the
possibility for mistaken or malicious For the first time your sensitive
disclosure. information can be made available
for distribution and collaboration on
By applying data-centric security, your terms, without the risk of
companies can ensure that the interception, unintentional loss or
information itself has a persistently theft. Celestix BSA keeps control of
applied level of security around the your sensitive data no matter
document itself, thereby keeping it where it goes or who it‟s being
safe wherever it needs to go. shared with.
Outbound
“89.9% of all unwanted Data leaks Websense V-Series
Appliance
Acceptable use
emails contain links to Compliance
TruEmail DLP
Unified Policy Control and
spam sites or Reporting Across Email,
Web and Data
malicious websites.”
Websense 2010 Threat
Report
reputation-based security to granular policy controls guards
provide adequate protection. It also against outgoing malicious or
underscores the importance of accidental data loss.
Today email security and Web dynamic Web security intelligence
security have converged. In a in stopping email security threats. Websense ESG also taps into their
recent threat report conducted by hosted email security offering,
Websense, over 89% of unwanted Websense Email Security intercepting all spam and other
email contains an embedded link to Gateway is the only email security unwanted email in the cloud,
a website. Email is typically the product anywhere that offers freeing up your servers and
lure to a website that delivers the embedded, enterprise-class data preserving bandwidth. What‟s
attack and more often than not, loss prevention (DLP) that screens more, it is all wrapped up into the
the website itself is a legitimate incoming email for blended threats single TRITON interface meaning
site that has been recently that contain links to malicious you don‟t have to worry about the
compromised. This makes it nearly websites, invasive script, or other extra expense and complexity of
impossible for legacy signature and web threats. Use of the extremely multiple vendors or interfaces.
What is Websense
TRITON?
The Websense TRITON solution
consolidates web security, email
security and data loss prevention (DLP)
into a highly flexible and scalable
architecture that unifies content
analysis, platforms, and security
management.
based and on-premise platforms single interface with management and
The unified platform offers several through Websense TruHybrid reporting capabilities for Websense
benefits. First, the freedom of deployment enables you to best meet web, email, and DLP technologies.
deploying content security solutions in the needs of headquarters, remote
the cloud or on-premise offers the offices, and mobile workers. Unified Compared with narrowly focused point
flexibility to meet changing security management spans the Websense solutions, the TRITON solution provides
requirements. Second, the on-premise hybrid deployment option ensuring unrivalled visibility into an
platform is highly integrated, enabling that remote office and mobile workers organisation‟s computing environment
web, email, or data security solutions to receive the same high-quality and application traffic, thereby
operate on a single appliance. Finally, protection consistent with their HQ- delivering superior flexibility and
tight integration between the cloud- based colleagues. And you receive a control.
Page 17
e92plus Technical Services:
We‟re here to make business easier
At e92plus, we provide extensive value added services to help you grow your business profitably - including sales
assistance and a wide range of marketing services including lead generation, email marketing and events.
In addition, our Technical Support is here to help you secure your customers' business. From Accredited Training, to
Installation, to Support, we help add value through our years of experience and product knowledge.
To help ensure your customers are Plus, it‟s a great way to explore
getting the most from their additional opportunities around
investment, e92plus now include a new or complementary products
free Security Healthcheck with and increase the value of the
every renewal. business to you with that customer.
Page 18
e-centives is the fantastic Rewards Portal from e92plus - and with new
programmes available, there has never been a better time to sign up and
start getting rewarded!
Every time you place a qualifying order with e92plus, you can earn
e-centive points. These points are collected across all the different
schemes - see below for more details - and can be saved for as long as
you want.
This means that you can spend your points on thousands of great
gifts instantly, from DVDs to a new iPad, or even save them up for a
summer holiday!
For every order over £250 for any All orders for Barracuda model Complete at least 2 ESG „Guru on
of Avira‟s Anti-Virus products (not series 400 and above will be the GO‟ training sessions and log
including renewals) you can earn eligible for e-centives points. The a deal registration for over 250
points to spend on fantastic larger the appliance, the more seats and you will be able to
e-centive rewards. points you will receive! claim e-centives points.
Cyberoam‟s range of feature-rich Drobo delivers enterprise class EncryptStick transforms any USB
UTM appliances are suitable for SAN and File Storage with great Flash Drive into a Digital Privacy
both small and large businesses. reliability and ease of use. Manager to keep files secure.
LG Network Monitors enable a Lumension Security provides NComputing provide simple and
single PC to be easily shared by unified protection and control of affordable desktop virtualisation
up to 31 individual users endpoints, apps and devices. solutions.
VASCO is the number one Websense is a global leader in WebSpy analysis and reporting
supplier of strong (Two-Factor) integrated Web security, Data software transforms log file data
authentication services. security and Email security. into manageable information.