You are on page 1of 20

Inside Intel‟s

launch into security


We talk to Intel about their new Anti Theft Technology
and their collaboration with WinMagic

Infosecurity Websense How to secure


Europe 2011 announce ESG your Wi-Fi

Who to see at the Email Security Best practices for


year‟s biggest Gateway completes implementing
information security the unified TRITON enterprise wireless
expo platform security

www.e92plus.com Spring 2011


Introducing SecurityPlus
The leading security magazine from e92plus

Welcome to the latest edition of SecurityPlus from e92plus:


essential industry insights and interviews from your IT Security Distribution Partner.

2011 is an exciting year for e92plus, as we build on three successive years of growth.
We were delighted to end 2010 on a high after being awarded the prestigious
title of Security Distributor of the Year at the CRN Awards - so a big thank you to
everyone for your support!

We also welcome new vendor partners on board, including innovative storage from Drobo, desktop virtualisation
from LG and advanced network reporting from WebSpy.

Don‟t forget, SecurityPlus is unique to e92plus - and is available to our reseller partners with your own branding as
part of a full marketing campaign. If you are interested in taking part, email us at securityplus@e92plus.com.

Mukesh Gupta
Managing Director of e92plus

Inside this edition


Page 3 Infosecurity Europe 2011 Page 13 Global Radio authenticate with 2FA
Who to see at this year‟s exhibition. How they maximised flexibility offered to
their workforce using 2FA via mobile phone.
Page 4 Is your sensitive corporate data secure?
Page 14 Securing your VPN traffic
The challenge of sharing key information
without compromising security. How to avoid the security loopholes
associated with remote VPN access.
Page 5 Meeting the challenge of modern email
threats with Websense Email Security Page 15 New SMB focused storage products
The risks associated with email have changed Sophisticated storage solutions from Drobo
significantly over the last few years. for small and medium businesses.
Page 6 Revolution through evolution: Page 15 The world’s first portable, encrypted
the launch of Intelligent Whitelisting private web browser
Reduce operational headaches, remove Unparalleled web surfing privacy via USB.
endpoint complexity and lower TCO.
Page 16 LG offer a recession beating solution
Page 7 What hackers know that you don’t
Meeting the demand for low-cost desktops.
Bridging the gap between on-premise and
Page 16 Does poor AV performance turn you off?
hosted security solutions.
Why 25% of users admit to turning off their
Page 8 Is your Wi-Fi network secure enough?
anti-virus protection.
What are the best practices when it comes to
Page 17 Security news in brief
enterprise wireless security?
Including news from Websense, WinMagic
Page 9 High security, low cost 2FA
and how some companies spend more on
Authenticating users is an essential security coffee than their security!
issue to tackle today.
Page 18 e92plus Technical Services:
Page 10 Interview with Intel We’re here to make business easier
We speak to Intel about their entrance into We help add value through our extensive
the security market. experience and product knowledge.
Page 12 The secret key to your network Page 19 e-centives Rewards
The importance of implementing a log Find out what‟s available in Q2 2011 from
management process. our exclusive reseller rewards programme.

Page 2
Infosecurity Europe 2011
19-21st April, Earls Court, London
Infosecurity is Europe's most comprehensive gathering of information
security professionals, located at Earls Court. Showcasing the most diverse
range of new and innovative products and services, and addressing today's
strategic and technical issues in an unrivalled free-to-attend education
programme.

Many of our leading vendors will be at the event - and it‟s an ideal
opportunity for you to visit their stands, see the latest technology and
learn more about the great opportunities available.

Key vendors to visit

Avira will be attending Infosecurity Come and visit the Barracuda Celestix will be showcasing their
Europe for the first time this year, stand for a hands-on new HOTPin 2FA and BSA
promoting their Anti Virus demonstration of their unique solutions. You can also enjoy a
technology and their new hosted Backup Service, and get updated live demonstration of Microsoft
email security solution. on the rest of product range. TMG & UAG in action.

Stand L88 Stand C10 Stand C40

Come and see Drobo‟s range of Visit Vasco for the perfect solution Websense will be demonstrating
award-winning data storage for integrated remote access, web their new Email Security Gateway
products that provide unrivalled application and network log on solution which completes their
data protection, management authentication. TRITON interface, combining web,
features and ease-of-use. email and data solutions.

Stand K75 Stand C21 Stand E10

Book a meeting with


e92plus and our vendors
The above vendors will all be exhibiting at this years Infosec, but they
Visit WinMagic‟s stand to learn
would love to take time out to meet with resellers one-on-one to
why their encryption is trusted by
discuss how we can work together to increase your business.
enterprises worldwide, and see a
If you would like to book a meeting time with us or any of our vendor
demonstration of Intel‟s new AT
partners please visit our Infosec landing page and fill in the form:
technology.
www.e92plus.com/infosec
Stand B71

Page 3
To share or not to share:
Is your sensitive corporate data secure?
In today‟s world, mission critical What’s the real impact of data This also means that additional
data needs to be shared quickly leakage? layers of security can be
and securely. The increasing introduced, enhancing the data
requirement to send information In a recent survey conducted by owner‟s ability to control what can
between users all across the globe Forrester titled “The Value of happen to the information, who can
means that sensitive data is Corporate Secrets”, the associated access it, when they can access it
constantly at risk. With the rising cost of a data leak derived from a and where. With these parameters
sophistication and frequency of rogue employee stealing sensitive in place, companies can define
threats, it‟s essential that company documents was estimated everything needed to ensure
information is secured no matter to be at least £250,000. Meanwhile information security both internally
where it is, how it‟s sent, or who the cost of a data leak from an and externally to the business
it‟s being shared with. outside business partner losing or whilst still remaining flexible and
abusing sensitive information was with enough granularities to cope
The Challenge over £75,000 per incident. with the many different levels of
access different parties need.
A critical part of today‟s business Breaches of data security don‟t just
operations is the efficient sharing have direct financial impact. They Introducing Celestix BSA
and distribution of information can also lead to bad press, lower
between employees and non- customer confidence, brand and As a global leader in securing
employees such as contractors, reputation damage and potential business information, Celestix
vendors or partners. Organisations fines imposed by regulatory Networks is bringing to market the
depend upon users being able to authorities. BSA appliance to specifically
collaborate easily and share address the critical data protection
information quickly. The challenge Think Data-Centric Security challenges businesses face.
is how to easily secure sensitive Celestix BSA is an integrated
information whilst making it Securing your network, devices and appliance solution that delivers:
available to legitimate users when applications is one step in the
and where they need it. overall security chain – but what  Information Rights
For example, attaching a about securing the data itself? Management – ensuring the
confidential document to an email Encrypting an entire laptop doesn‟t right people get the right level of
is an easy and efficient way of help to protect data when being access to the appropriate files.
transferring information, but how shared: it only addresses the loss
secure is it? If the document is of the device and data at rest, and  Secure Managed File Transfer
highly confidential and contains does not help in securing data that - industry leading 2048-bit
valuable information, what needs to be shared in order to be encryption applied to both the
protection methods are used whilst used effectively. transfer and to the file itself.
the file is in transit, and after it‟s
 Persistent Data File
received? The result of insufficient Transmitting data securely from
Encryption – Protection applied
data protection methods can result point A to point B is just one step in
to any file type, any transport
in damaging data leakage. its journey – but what happens
method and whilst in storage.
when it reaches point B, the
recipient? How do you ensure that  Auditing & Compliance
the data, now it has safely reached Reporting – Supports
its destination, is only accessed by regulatory compliance by
the recipient you want to access it providing reporting and audit
and not by anyone else? To use the trail functions of the file
information it has to be opened in a activities.
decrypted state, leaving the
possibility for mistaken or malicious For the first time your sensitive
disclosure. information can be made available
for distribution and collaboration on
By applying data-centric security, your terms, without the risk of
companies can ensure that the interception, unintentional loss or
information itself has a persistently theft. Celestix BSA keeps control of
applied level of security around the your sensitive data no matter
document itself, thereby keeping it where it goes or who it‟s being
safe wherever it needs to go. shared with.

find out more at www.securityplusonline.co.uk/BSA


Meeting the challenge of modern email
threats with Websense Email Security
When you examine the challenge
Inbound Threats Websense Email Security Gateway Anywhere
that companies are facing when it
 Spam
comes to modern email security, it  Viruses SaaS
becomes apparent that the threats  Malicious URLs
 Offload all inbound email
processing
and risks associated with email  Maximise resiliency by
queuing inbound email in
have changed significantly over the the cloud
last few years.  Reduces network and
bandwidth load

Outbound
“89.9% of all unwanted  Data leaks Websense V-Series
Appliance
 Acceptable use
emails contain links to  Compliance


TruEmail DLP
Unified Policy Control and
spam sites or Reporting Across Email,
Web and Data
malicious websites.”
Websense 2010 Threat
Report
reputation-based security to granular policy controls guards
provide adequate protection. It also against outgoing malicious or
underscores the importance of accidental data loss.
Today email security and Web dynamic Web security intelligence
security have converged. In a in stopping email security threats. Websense ESG also taps into their
recent threat report conducted by hosted email security offering,
Websense, over 89% of unwanted Websense Email Security intercepting all spam and other
email contains an embedded link to Gateway is the only email security unwanted email in the cloud,
a website. Email is typically the product anywhere that offers freeing up your servers and
lure to a website that delivers the embedded, enterprise-class data preserving bandwidth. What‟s
attack and more often than not, loss prevention (DLP) that screens more, it is all wrapped up into the
the website itself is a legitimate incoming email for blended threats single TRITON interface meaning
site that has been recently that contain links to malicious you don‟t have to worry about the
compromised. This makes it nearly websites, invasive script, or other extra expense and complexity of
impossible for legacy signature and web threats. Use of the extremely multiple vendors or interfaces.

What is Websense
TRITON?
The Websense TRITON solution
consolidates web security, email
security and data loss prevention (DLP)
into a highly flexible and scalable
architecture that unifies content
analysis, platforms, and security
management.
based and on-premise platforms single interface with management and
The unified platform offers several through Websense TruHybrid reporting capabilities for Websense
benefits. First, the freedom of deployment enables you to best meet web, email, and DLP technologies.
deploying content security solutions in the needs of headquarters, remote
the cloud or on-premise offers the offices, and mobile workers. Unified Compared with narrowly focused point
flexibility to meet changing security management spans the Websense solutions, the TRITON solution provides
requirements. Second, the on-premise hybrid deployment option ensuring unrivalled visibility into an
platform is highly integrated, enabling that remote office and mobile workers organisation‟s computing environment
web, email, or data security solutions to receive the same high-quality and application traffic, thereby
operate on a single appliance. Finally, protection consistent with their HQ- delivering superior flexibility and
tight integration between the cloud- based colleagues. And you receive a control.

request an evaluation at www.securityplusonline.co.uk/Websense Page 5


Revolution through evolution:
the launch of Intelligent Whitelisting
The current approach to protecting services, and ports turned off by is adding to the security and
endpoints is ineffective, and this is default – and that‟s where they operational overhead in today‟s IT
costing organisations time and stayed until someone explicitly environments.
money. Malware has exploded; authorised and enabled (or
endpoint complexity continues to “whitelisted”) them. As computer Advances in application whitelisting
increase due to the many 3rd party use flourished outside of the server now focus on making the technology
and so-called Web 2.0 applications; room and as more users required a more flexible for today‟s dynamic
and security products today are growing number of new applications, endpoint. New levels of intelligence
more complicated than ever. Adding IT managers found whitelisting too are being added through trusted
to the challenge is stagnate IT restrictive, too inflexible, and too change engines and whitelist
budgets. difficult to manage within the management can integrate with
modern enterprise. So, while other tools like patch management.
Application whitelisting, sometimes effective, application whitelisting And no longer is application
referred to as application control, is became a security tool generally whitelisting an alternative to anti-
one of the original security models. reserved for static environments virus. AV will continue to play a role
It prevents any program file / such as mission critical servers, in endpoint security, as will patch
executable from running unless kiosks, POS systems, and the like. management and other technologies
explicitly permitted in the whitelist. like device control. But now
By creating a whitelist of known The Present application whitelisting will play an
good applications, everything else – Today, the vulnerabilities in increasingly important role in your
malware, unwanted applications, operating systems and 3rd party defence-in-depth approach to
unknown programs, etc. – is blocked applications are increasing; endpoint protection.
until authorised to run. While few according to NSS Labs, historically
doubt its effectiveness as a security about 6,000 to 7,000 vulnerabilities Lumension Intelligent
tool, historically it has not been were found in applications in any Whitelisting™ is the industry's first
flexible enough for the modern given year, but in 2010 the count integrated, application whitelisting
enterprise. was closer to 10,000. The malware solution that combines patch
being pushed out to exploit management, application control,
The Past vulnerabilities have exploded both in anti-virus, and trust-based change
At the dawn of the modern number and sophistication. Hackers management into a single, unified
computing age, computers and are layering complex methods that workflow.
devices arrived with all features, subtly alter single pieces of malware
to make them look like hundreds of Delivered through LEMSS
different applications to the blacklist Management Console, Intelligent
signature (AV) engines. Whitelisting helps you to reduce
operational headaches, remove
Additionally, as malware has endpoint complexity, lower total cost
exploded, so have the costs of ownership and regain control of
associated with it, including rising your endpoints.
help desk calls, tier 2 and 3 event
management, HD re-imaging,  Continuous Protection quickly
network downtime, lost employee enforces whitelist policies to
productivity, and so on. prevent untrusted changes

The Future  Simplified Deployment


One can distil the root causes of provides a snapshot to define
most endpoint security issues to a policies
single core issue: a breakdown in
 Flexible Automation allows on-
change control. Whether that
the-fly policy changes to facilitate
manifests itself through malware or
authorised updates
end users installing unauthorised
applications, the lack of an  Unified Workflow integrates
established change-control policy – Application Control, AV and Patch
or the ability to enforce this policy – Management into a seamless
workflow

Page 6 learn more at www.securityplusonline.co.uk/lumension


What hackers know that you don‟t:
Cloud security for web 2.0
Many organisations are finding that and remote offices are added to the
the weakest link in the security equation. Simply put, premise-based Typical challenges
chain is the endpoint device, or security solutions cannot scale
more specifically, the end user. beyond the corporate edge. with web 2.0
Whether it is through carelessness,
ignorance, malicious intent or just One way to address the problem is Users trust website content without
plain ignoring the rules, end users to use hosted security solutions to hesitation.
introduce all sorts of security ills into protect users from the security People will click on links - and that
a business network. problems created by hosted applies equally to a contact on
applications. That concept LinkedIn as it does a surfing cat on
However, one of the biggest completely changes the dynamic of Facebook.
considerations for network managers dealing with security. In practice the
today is the need to provide user is always protected, regardless Most people trust social network
users.
flexibility. Today‟s workers have of what they are connecting to.
Despite the ubiquity of anonymity
come to rely on social networks, Ideally, a fully implemented security
online and the inherent dangers we
websites and electronic messaging cloud solution will handle and control
all know, most people will trust a
to gather the information needed to all web traffic between the user and
familiar name.
perform their jobs, build business their destination, regardless of the
relationships and access external user‟s location and connectivity Nobody resists free Wi-Fi.
information. Those necessities methods. The temptation in the coffee shop is to
create a conundrum for security just quickly check those emails, but
professionals: on one hand, Barracuda Flex is a cloud-based one simple bad connection can blast a
administrators can limit the access secure Web gateway that protects gaping hole in your network.
to those resources, but productivity users from malware, phishing,
will eventually suffer, while on the identity theft, and other harmful End users execute code from places
other hand, opening up a network to activity online. The service sits they trust.
external resources can result in a between a company‟s network and They can‟t help it - Trojan-laced
myriad if security problems. It all the internet to protect the banner ads on Web 2.0 sites such as
comes down to balance and company‟s users as they conduct MySpace often require no user
acceptable risk. business-critical activities on the interaction to activate infection.
web. The management is handled
Simply put, all that typical end users through a familiar Barracuda console Browsers are the new security
desire is unhindered access to the interface, with infinite scalability to flashpoint.
resources they need to perform their allow your business to grow without We all need them, but IT departments
duties. For IT to provide that access, necessitating expensive hardware or can‟t control them and “zero-day”
a multitude of security services need software upgrades. vulnerabilities have replaced AV as
to be implemented, all without the distribution method for malware.
burdening the end user and still
offering the highest level of
protection. These requirements are
often beyond what can be done with
desktop or endpoint-based security
products, forcing IT to adopt highly
integrated security solutions which
are burdensome, expensive and
short of fully reliable.

Finally, there is an increased


administrative burden in the form of
security. Most Web 2.0 services
allow users to bypass corporate
controls and access applications
directly, leaving only local (PC-
based) security and possibly the
corporate firewall between the end-
user and the application. The
problem worsens when mobile users

request an evaluation at www.securityplusonline.co.uk/barracuda Page 7


Are Wi-Fi networks secure enough
for the enterprise?
Wireless networks are common Standard
First
Encryption Authentication
Relative
today in many security conscious Certified Strength
industries such as government, WPA2 Enterprise 2004 AES 802.1X w/ EAP Very High
healthcare, and financial services. WPA2 Personal 2004 AES Pre-Shared Key Moderate
You might be wondering how such
WPA Enterprise 2003 TKIP 802.1X w/ EAP High
organisations are even able to
deploy wireless networks given WPA Personal 2003 TKIP Pre-Shared Key Moderately Low
some of the well-publicised attacks WEP 2000 WEP Shared Key / Open Low
on wireless security, for example the
one that affected TJ Maxx in the ways, Personal and Enterprise. WPA/ In addition to these technical
United States circa 2007. WPA2 Personal use pre-shared keys mechanisms, do not overlook the
with the same key placed into both basics. Change default values such
Historically, the most significant Wi- the access point and the wireless as the administrator username and
Fi attacks have been due to reliance station (e.g. laptop). The key is used password, SNMP community strings,
on an outdated security standard to authenticate the station and etc.
called WEP (Wired Equivalent encrypt its traffic. Unfortunately,
Privacy). Today, if wireless security WPA/WPA2 Personal is subject to The following summarises best
is planned with “defence-in-depth” in offline dictionary attacks. practices with regards to enterprise
mind, the wireless network can be wireless security:
equal to or more secure than a wired WPA/WPA2 Enterprise leverages a
network. Defence-in-depth provides server-side digital certificate on a  Implement WPA2 Enterprise
different layers of security through RADIUS server. Client-side where possible – this is the most
mechanisms such as encryption, credentials vary and can include important one. Using WPA2
authentication, firewalls, and username/password combinations, Enterprise eliminates the impact
intrusion detection & prevention. tokens, or digital certificates. of many attacks.
This article will discuss best practice Additionally, WPA2 uses the best-in-
recommendations for each of these. class Advanced Encryption Standard  If using WPA/WPA2 Personal, use
(AES) which is currently considered long pass-phrases (a minimum of
WEP was the first wireless unbreakable. The Wi-Fi security 15-20 characters) which are
encryption standard but was cracked standards are summarised in the much more resistant to attacks.
within a few years after its inception. table above.
 When implementing WIDS/WIPS,
Unfortunately, the knowledge of this
choose a solution with dedicated
failure has propagated in the minds Once authenticated into the wireless
sensors to provide 24x7
of people today. To address the network, it is best practice to use an
protection.
security hole of WEP, the Wi-Fi integrated stateful firewall to further
industry instituted WPA (Wi-Fi segment access to network  Segment users into different
Protected Access). WPA came out in resources. Firewall rules can then be groups and leverage firewall rule
two different versions – WPA and written to allow or deny access sets to give each group only the
WPA2. based on factors such as IP address, access they need.
port, service, or time of day.
The WPA and WPA2 frameworks can  Don‟t overlook the basics, such as
be implemented in two different Another important piece of security changing default values and end-
on Wi-Fi networks is wireless user security awareness training.
intrusion detection & prevention
systems (WIDS/WIPS). These All things considered, is wireless
systems scan the air, either via secure enough for your
dedicated sensor radios that organisation? Absolutely. By
scan 24 hours a day or by implementing the idea of defence-in-
time-slicing. Time-slicing depth and following best practices,
sensor radios also serve wireless can be equally (or more)
wireless stations and so secure than wired networks.
periodically scan off-channel
to detect threats to the Xirrus is the leader in high
network, reducing the performance Wi-Fi delivering
amount of effective time they unmatched performance, giving you
have to scan. greater capacity and bandwidth with
fewer devices, ports and cabling.

Page 8 watch our videos at www.securityplusonline.co.uk/xirrus


HOTPin from Celestix: High security,
low cost two-factor authentication
Introducing HOTPin 3.0 – Next remote employees is a key benefit of
Generation Tokenless Two- DirectAccess (DA), but also creates a Why use soft tokens
Factor Authentication (2FA). new level of risk.
for 2FA?
Form grabbers, keyloggers, and DirectAccess from Microsoft is
phishing are a few of the tools exclusive to Windows 7, and With HOTPin from Celestix, you can
hackers use to steal user-login IDs. provides the ultimate user enjoy the benefits of „soft tokens‟ -
Selling stolen IDs has become a experience when working remotely the simple alternative to traditional
sophisticated business, which brings by providing full desktop access to hard tokens that deliver fantastic
up the question: who really is on the network. benefits:
your network? Authenticating
users is the right security issue to HOTPin integrates with DA to add  Great for extranet partners,
tackle today. another layer of security by customers or contractors - no
requiring users to enter an OTP need to redistribute hardware
Celestix has introduced the before they can access the network. tokens after short-term use and
latest version of its leading 2FA The HOTPin/DA combination helps you can repurpose user licencing
solution, HOTPin 3.0. organisations to ensure their on the fly.
resources are protected, even with  Enjoy a lower cost, by avoiding
HOTPin enables organisations to „always on‟ remote connectivity. expensive hardware tokens.
leverage their existing infrastructure
and resources to add another layer Simplified remote access  Stronger compliance with PCI,
of security for remote access. It SOX, HIPPA and other regulations.
positively verifies who gets access to HOTPin provides a single, integrated
resources by adding a second factor platform for strong two-factor
 Increased employee mobility,
without worrying about keeping
of authentication using OTPs (One security using existing infrastructure
the token with you - everyone
Time Passwords) that can be used in investment. It is easy to setup and
always has their mobile to hand.
conjunction with a PIN. OTPs are deploy to large numbers of
delivered via email, SMS text or soft geographically diverse users and it  State of the art technology keeps
tokens via the user‟s mobile device. meets the demands of industry you on the leading edge of 2FA.
Soft token devices include iPhone, regulations like PCI DSS, FFIEC,
Windows Mobile, Windows, Symbian, HIPAA, and Sarbanes-Oxley.  Highly interoperable with
Android, and Blackberry. Microsoft infrastructures for
HOTPin delivers a feature-rich reliable operations.
What’s new with HOTPin 3.0? authentication solution at a fraction  Lower environmental impact: no
of the cost of competing 2FA expired hardware tokens to send
Although HOTPin was the first 2FA options, and it scales with the needs to landfills.
system fully integrated with of any sized organisation.
Microsoft Unified Access Gateway
(UAG), the new version of HOTPin
can now be integrated with any SSL
VPN or firewall product, or it can be
deployed as a standalone appliance
solution.

It also adds further integration with


Microsoft technologies such as
DirectAccess and Active Directory.
Other highlights include advanced
user reporting capabilities and
integrated high availability options.

Enhanced security for


DirectAccess from Microsoft

With today‟s workforce more mobile


than ever, providing a seamless
connection to internal resources for

request an evaluation at www.securityplusonline.co.uk/HOTPin Page 9


It’s not just your PC - it’s your business
We speak to Intel
Intel® Anti Theft Technology capabilities. WinMagic has enhanced Connectivity, and Security. Every
(Intel® AT) is technology from their product to leverage these week in the news, we hear about
Intel that provides intelligent hardware capabilities, which in turn some website that‟s been hacked, a
security for lost or stolen provides a more robust offering to notebook was stolen with customers
laptops – all built into the their customers. data, or some new internet fraud
hardware, and gives you scheme…Security is becoming more
protection no matter what Intel has chosen to collaborate and more important and Intel
happens to the laptop*. with WinMagic to include an believes that leveraging features in
encryption solution in Intel AT. our silicon, Intel, through our ISVs
Can you tell us more about how like WinMagic, can provide more
the two solutions work together, secure, differentiated solutions to
and why you have chosen their customers. Intel® Anti-Theft
WinMagic as a key encryption Technology is one example, as well
partner? as Intel® Identity Protection
Technology (Intel® ITP).
As I mentioned earlier, WinMagic
has incorporated support for Intel® How do security resellers add
Anti-Theft Technology into value to Intel AT?
WinMagic‟s SecureDoc console to
allow a service provider or IT Security solutions can have a high
department to manage SecureDoc level of complexity and security
encryption and Intel AT from the resellers play a vital role in the
same console. selection, implementation, and
support of those solutions. Without
On an Intel AT capable notebook, security partners like e92plus, many
encryption keys are stored in a companies would be forced to enter
protected area of the Intel this market alone. Customers, both
We spoke to Glenn Le Vernois, of manageability engine. When the PC large and small, need a trusted
Intel’s Services Program Office, is marked as stolen, access to this advisor to help them understand the
about Intel’s entrance into the protected area, including the changing technologies and to help
security market, their encryption keys is disabled. Utilising them select the right solutions.
collaboration with WinMagic and this unique hardware feature
the future of data security. provides for a more robust and more Intel AT can be a component of a
secure solution. security reseller‟s portfolio, which
Hello Glenn, and thanks to could include Intel AT, encryption
speaking to SecurityPlus. Can WinMagic‟s SecureDoc full disk and complimentary services such as
you tell us about the Intel AT Encryption, support of Opal Self backup and restore, help desk, and
service, and what it means for Encrypting drives, and support for management. This portfolio can
your customers? Intel AT provides a very robust even be sold as a service, hosted
security solution for the customer and managed by the security
Intel® Anti-Theft Technology who needs to ensure their data is reseller.
(Intel® AT) can remotely disable a encrypted.
PC should it become lost or stolen. IT budgets are under severe
If stolen, a “Poison Pill” can be sent The combination of Intel AT with pressure due to the economic
to the PC over the internet or via 3G SecureDoc encryption provides a challenges many organisations
text message which immediately very powerful solution to protect are facing, so how does Intel AT
disables the system. In addition, the critical data. deliver ROI (Return on
system is required to check-in Investment) to the user?
(rendezvous) with a server on a pre- The development of Intel AT is a
determined interval. Should the significant move for Intel, as it The ROI will vary, depending on a
system miss a rendezvous, it will has not only brought you into number of factors – ISV, usage
assume that it‟s lost or stolen. the security market but also into model, mitigated risk, and the end-
services. What were the key users business. In many cases, Intel
Intel® Anti-Theft Technology utilises drivers for this move? AT is sold as part of the ISVs
a special capability in the Intel solution, so the ROI for Intel AT
chipset‟s manageability engine, Intel‟s focus for 2011 is in three becomes part of their value
which provides special hardware areas…Energy Efficient Computing, proposition.

Page 10 looking to find out more about Intel Anti-Theft?


Interview with
Glenn Le Vernois
The primary usage models for Intel Securing confidential data is a broad
AT is to disable the PC, however topic, as security is a key focus for
there are other benefits / usage Intel, we will continue to add new
models which may solve problems technologies to our processors and
that some companies may have not chipsets which can be leveraged
considered: through our ecosystem of ISVs and
security resellers to enhance the
 Working with Encryption ISVs, solutions they deliver to their
Intel AT can provide enhance customers. As cloud computing
encryption by leveraging unique becomes a new norm, it will present
capabilities in the Intel new challenges and opportunities in
manageability engine. Using  Some Telcos are using Intel AT this space...beyond that, your guess
encryption technology and Intel as a way to ensure customers is as good as mine!
AT can mitigate risk of data loss who finance the purchase of a PC
in the case of a stolen notebook. through their monthly billing, You can find out more about Intel
continue to pay their bills. In AT and how it integrates with
 Other ISVs can provide a some countries theft of WinMagic to provide comprehensive
mechanism for recovering the notebooks is very high and Intel security for your laptop at
lost or stolen notebook, as it will AT can reduce theft, as the www.securityplusonline.co.uk/
beacon its location to that the system will become locked down intel or antitheft.intel.com
system can be recovered. if stolen, so greatly reducing the
Intel, the Intel logo and the Intel Anti-Theft
 Some school districts use Intel AT notebooks‟ value post-theft. Technology mark are the trademarks of Intel
Corporation in the US and/or other countries
to disable notebooks during
school breaks deterring Finally, what do you see as the * No system can provide absolute security under all
prospective thieves. major challenges for conditions. Requires an enabled chipset, BIOS,
firmware and software and a subscription with a
organisations in securing capable Service Provider. Consult your system
 Some ISVs support geo-fencing, confidential data over the next 5 manufacturer and Service Provider for availability and
functionality. Intel assumes no liability for lost or
which allows the PC to only years, and what role will Intel stolen data and/or systems or any other damages
operate within this pre-defined AT play in meeting them? resulting thereof. For more information, visit
www.intel.com/go/anti-theft
area.

Delivering Intel AT one management console for all


notebooks embedded with Intel AT.
with WinMagic WinMagic provides a data protection
solution that protects endpoint devices,
removable media, sensitive files,
The continued rise of the mobile
applications, residual information (such
workers combined with an ever
as temp files), and the operating
increasing volume of data has messages to encourage the computer‟s
system from unauthorised access. safe return. And once returned, it‟s
presented IT departments with more
challenges than ever before: simple to reactivate the laptop without
Through the SecureDoc Enterprise
harming the hardware or data.
Server (SES), it is possible to disable
 The average cost incurred due to a user access to the data in a non-
lost laptop is $49,246 1 Intel AT is available today in
destructive manner. Even if the user
partnership with WinMagic, providing
 More than 88% of all cases in this (for example, a terminated employee)
you with a strong anti-theft protection
year‟s study involved insider still has valid credentials and moves
negligence 2 solution for lost or stolen laptops .
the drive to another machine, the user
 Each year, 2m notebooks are will not be able to access the data.
For more information on the service, or
reported stolen and 97% of stolen to request a demonstration of the
computers are never recovered 3 The solution is flexible to configure,
solution, visit our website. You can also
and simple to deploy. The built-in,
find out which laptops are already
To provide organisations with a tamper-resistant security renders a
equipped with Intel AT technology at
complete, fully integrated solution laptop unusable while also blocking http://antitheft.intel.com.
WinMagic combines Intel® Anti-Theft access to the valuable information
Technology (Intel® AT) with full hard stored on its encrypted hard drive. It 1
2
Ponemon Institute, Feb 2009
Ponemon Institute, Jan 2009
disk & removable media encryption in also features customisable recovery 3
Processor, May 2006

visit us at www.securityplusonline.co.uk/Intel Page 11


The secret key to your network:
Unlocking the value of your log data
Organisations today are deploying a 1. Establish acceptable usage
variety of security solutions to polices - this is the first step We needed accurate
counter the ever increasing threat to towards reducing inappropriate reporting of web usage
their email and internet usage before you implement any
and the ability to
investments. Often, the emergence form of filtering, and essential to
of new threats spawn solutions by ensure the workforce understands analyse where our
different companies with a niche or a what the rules are. Improvements bandwidth was
specialty for that specific threat - are often seen early on if the staff going...WebSpy
whether it is a guard against know the reporting is in place.
viruses, spam, intrusion detection,
allowed us to
spyware, data leakage or any of the 2. Establish your reporting understand exactly that.
other segments within the security requirements, especially to ensure Codemasters UK
landscape. you meet any obligations under any
laws or regulations relevant to your
This heterogeneous security industry or geography. It‟s all
environment means that there has important to examine who needs
been a proliferation of log data reports - senior and line
generated by the various systems or management would often benefit as
devices. As the number of different well as the IT department.
log formats increases coupled with
the sheer volume of log data, the 3. Research your existing
more difficult it becomes for capabilities - you may find that
organisations to turn this data into many devices produce logs
meaningful business information. (including proxy servers, firewalls,
routers and email servers) that
Transforming data into information could give you an insight into data
means that you know the “who, loss or remote access activity.
what, when, where, and how” -
giving you the ability to make 4. Establish log management
informed business decisions. There procedures - it‟s important to WebSpy are a leading global
is no point capturing data if you do establish and maintain the provider of solutions that provide a
not use it to improve aspects of your infrastructure and administration for transparent view over organisations‟
business. Reducing recreational web capturing, transmitting, storing and internet, email and network usage.
browsing, improving network archiving or destroying log data. They enable organisations to protect
performance, and enhancing and maximise their internet
security, are just a few outcomes 5. Establish standard reporting investment and enjoy the benefits of
that can be achieved using procedures - regular reporting is a web-enabled environment while
information from regular log file essential to ensure that initial reducing costs and minimising
analysis. improvements are maintained. It‟s organisational risk.
also important to store user reports
However, who has time to in a secure location to ensure
review the logs of all the confidentiality is maintained.
network devices...let alone make
The benefits include the
sense of them? 6. Assign responsibilities - it‟s ability for real time
essential to identify roles and monitoring of internet
To achieve these outcomes, it is responsibilities for taking action on access by staff....since
important for organisations to have events, remembering that
a log management process in place responsibility is not only the security installation we have
with clear policies and procedures administrator‟s domain. reduced our internet
and also be equipped with the traffic by 30% which
appropriate tools that can take care 7. Review and adapt to changes -
of the ongoing monitoring, analysis because of the metamorphic nature
resulted in significant
and reporting of these logs. of the security environment it is savings and reduced
important to revisit steps 1-7 wasted productivity.
So, here‟s a few tips on what can be regularly and fine tune this process Mitcham Council
achieved through effective log to get the maximum value from your
reporting. network logs.

Page 12 learn more at www.securityplusonline.co.uk/WebSpy


Tune in for secure remote access!
Global Radio authenticate with 2FA
Boasting the number 1, 2 and 3 don‟t have to worry about the
commercial radio brands in the UK, distribution, and the authenticators
Global Radio is the model of can be managed centrally by the
efficient, brand driven, market company.”
leading radio with brands including
Heart, Capital FM and Classic FM. “However, we had already made
security investments previously so
Global Radio was it would have been a shame not to
looking for an use the hardware authenticators as
effective, cost- well. DIGIPASS for Mobile is our
effective and main solution, as it offers more
user-friendly flexibility and a very soft touch way
authentication of deployment and at the same
solution to secure time leaves the company in control
remote access for of the authenticators. DIGIPASS
website content GO3 and Virtual DIGIPASS are
editors working rather used as back-up or
from home updating online content. emergency solutions, in case there
However, there were a number of is a problem with an employee‟s
additional key requirements: mobile phone.”
VASCO‟s authentication solutions
 The ability for any system to
grow for use in future
deployments across more sites
VASCO offers us a cost-
 Work with existing hardware and Remote workers using a Virtual
software solutions effective, user-friendly
DIGIPASS to log in type in their
user name and PIN. A text message solution...with home
 Be up and running in 8 weeks!
containing the OTP is immediately workers using
sent to their mobile phone. DIGIPASS for Mobile,
Having chosen VASCO, the new
However, the main authenticator to
solution combined hardware and
secure remote access for Global there have not been
software options to maximise any incompatibility
Radio‟s home workers became
flexibility offered to the workforce.
VASCO‟s DIGIPASS for Mobile. The issues or questions
principle of OTP generation is the
The key principle of VASCO‟s strong about deployment from
same as in hardware
authentication solutions is the end-users.
authenticators, but in this case the
replacement of weak static
passwords with more secure
mobile phone becomes the Ross Draper
authentication device. DIGIPASS IP Infrastructure Manager
dynamic ones. Unlike traditional
for Mobile software creates the OTP Global Radio
static passwords, dynamic
that the user needs instantly and
passwords or OTPs (one-time
easily.
passwords) are only valid for a
limited amount of time and can be
“DIGIPASS for Mobile is one of the
used only once. Possible password
main reasons we chose VASCO as a
abuse is thus minimised, as it
strong authentication supplier”, also offer an opportunity to further
becomes impossible to re-use the
says Ross Draper, IP Infrastructure develop the company‟s security
password even if it were
Manager at Global Radio. “There infrastructure. The high scalability
intercepted.
are a lot of benefits to using a of the VASCO IDENTIKEY Server
mobile phone as an authentication allows Global Radio to easily add
Global Radio deployed VASCO in a
device. You don‟t have to provide more users and applications, and
flexible way, providing 3 different
your employees with hardware the flexibility of DIGIPASS for
options for users. For example, the
authenticators, when managing Mobile provide a way to use strong
content editors will be able to
many devices can be difficult and authentication for additional
generate an OTP at the push of the
costly, as people can lose them or purposes in the future - such as for
button of the DIGIPASS GO3
break them. DIGIPASS for Mobile is Network Logon or securing web
hardware authenticator.
a budget friendly solution: you applications.

request a free demo token at www.securityplusonline.co.uk/VASCO Page 13


Threat Free Tunnelling:
Securing your VPN traffic
Before the internet, for computer A
to talk to computer B located in a
different office, physical wire
connections were used. For security
reasons, you would want to ensure
that only your two computers used
that line, so you would contract with
a vendor to “lease” that circuit.
However, this network was
expensive, not scalable and
dependent on the local vendor to
provide the service.

With the advent of the internet,


there was no need for physical
connections. As long as each
computer can reach the internet,
information is shared using a
“virtual” network created by a local
ISP, across the internet. Stop Malware and SPAM Management and Reporting
The VPN traffic is inspected by To ensure compliance over VPN, it is
VPN is designed to securely extend thorough auto-updating anti-virus, crucial to have centralised
the organisation's network (LAN) anti-spyware and anti-spam features management that generates
beyond its physical boundaries. The of the UTM. These features ensure comprehensive event reporting,
very design of VPN ensures that the that no viruses, worms, Trojans, key proactive alerts, rapid forensic
content is secured in transit. But the -loggers, spyware and other analyses and complete audit trails.
biggest security loophole is at the malware or spam mail sneak
endpoint. Outside of IT control, through. VPNs, whether they use PPTP, L2TP,
these devices can often be IPSec or SSL, are appealing to
damaged, reconfigured, or lack Prevent Threats and Intrusions companies of all sizes. Even small
fundamental security maintenance The VPN traffic is subjected to an businesses find compelling reasons
and updates. Whether they connect Intrusion Prevention System (IPS) to implement VPNs. Many view VPNs
remotely or directly into the LAN, scan. This feature sanctifies the as a competitive advantage,
any user or device is potentially traffic by detecting and eliminating specifically because of their global
unsafe and can expose business any threats lurking in it. coverage and the relative ease with
data, posing huge security threats which they can be extended to
from malicious hackers, viruses, The Identity Aware Firewall create extranets which in turn can
worms and malware. You can set firewalls to restrict the help companies increase the
number of open ports, what type of productivity of their workforce by
What you need is a way to see packets pass through and which secure connectivity to key network
inside the tunnel without disrupting protocols are allowed. The identity resources.
its security. Cyberoam UTM's Threat driven TFT ensures that the
Free Tunnelling (TFT) security is credentials of each user is verified Maintaining network security
driven by the premise that the and custom security policies are requires constant vigilance, and
perimeter/endpoint of any enforced. maintaining VPN security even more
functionally accessible network, is vigilance. Given the growing interest
inherently insecure. The TFT secures Granular Access Policy and increasing deployment of VPN,
you by establishing an intelligent Cyberoam's Granular Access Policy it is vital to scale that interest in
layer of secure remote access driven control feature allows you to provide terms of security. Possessing a
by identity based policy control, specific resources to specific better understanding of VPNs and
enforced authentication, gateway employees depending on their their security mechanisms
firewall, granular access policy, and professional requirements. This empowers companies to extend the
gateway threat and malware feature is useful in SSL VPN borders of their business, without
protection by integrating VPN and situations when the person can increasing the vulnerability of their
UTM (Unified Threat Management) remotely access the LAN resources information assets.
functionalities. even from smart hand-held devices
or over insecure networks.

Page 14 find out more at www.securityplusonline.co.uk/cyberoam


Drobo enters the business arena with
new business focused storage products
Drobo, makers of the award-winning With more than 150,000 customers Drobo's new business line also
data storage product, have worldwide, Drobo has been includes performance
introduced a new line of embraced by individual professionals enhancements, new management
sophisticated yet easy-to-use and and small businesses globally. The software and extended business
affordable storage solutions for new Drobo business systems up the support and services, in addition to
small and medium businesses. ante with improved system the existing ease of use, affordable
performance and redundancy, a new capacity and storage features that
The new Drobo business systems business-oriented dashboard and set Drobo apart from any other
are optimal as primary and control panel and upgraded business storage product on the market.
secondary storage, as well as support options - all while
departmental file-sharing or offsite maintaining Drobo's breakthrough The systems are based on the
backup, and server virtualisation ease-of-use and the BeyondRAID patented BeyondRAID technology
deployments including those using data protection capabilities that and are certified for VMware, Citrix,
VMware solutions. define the Drobo brand. Microsoft Exchange and Symantec
backup.
"VMware recognises the importance
of affordable storage alternatives for
firms implementing virtualisation as
they continue on the path toward IT
as a service," explained Parag Patel,
vice president, global strategic
alliances, VMware. "Like larger
organisations, SMBs are looking for
ways to improve productivity and
lower IT costs. Drobo streamlines
VMware-virtualised storage for SMBs
by delivering storage that is simple,
scalable and automated - all with an
affordable price tag”. watch the video at www.securityplusonline.co.uk/Drobo

Encrypt Stick release the world‟s first


portable, encrypted private web browser
The long anticipated Digital The Encrypt Stick Private Browser
Privacy Browser has been ensures that even if someone gains
released by ENC Security access to your computer, they will
Systems - makers of the 'un- never know where you have been on
hackable' Encrypt Stick USB the internet. It maintains private
drive software. bookmarks and a cache to improve
performance in an encrypted vault
The Encrypt Stick Private Browser on your USB drive. This allows you
runs from your USB drive and to then plug the USB drive into
provides unparalleled web surfing virtually any computer in the world
privacy as it leaves behind no trace knowing that you and your browsing
whatsoever on the host computer. history are protected.
Recently publicised issues uncovered
in many popular web browsers has The Encrypt Stick Private Browser is
brought to light the fact that in now available as part of the Encrypt
“Private Mode” these browsers still Stick USB drive encryption software.
leave a trail of browsing history to
be left behind on your computer.

Download your copy at www.securityplusonline.co.uk/EncryptStick Page 15


A sensational desktop solution
from LG for beating the recession!
For the time being, it seems that the enabling a cost effective Virtual
global economic recession is Computing Solution. The
expected to worsen continuously. implementation of this solution will
Considering the need across all enable users to reduce upgrade
industries to optimise their costs by at least 60% per year, and
operations by saving costs and reduce system usage and
boosting business productivity, LG maintenance costs by 70%.
have introduced a breakthrough
product, which is the result of years In addition, the monitor is an ultra-
of R&D. low energy consumer (at least 90%
lower than other products) and
The LG Network Monitor has been minimises environmental waste.
developed to meet the demand for a
low-cost solution to the PC
replacement cycle due to the global
recession. In the B2B market, less
than 10% of the computing power of
a PC is generally being utilised at
any given time. The LG Network
Monitor product is a solution that
can redistribute the remaining 90%
of a PC‟s resources to several users,
simultaneously.

When connected to a single PC, LG


Network Monitor enables multiple
users to fulfil their computing needs,
request a demonstration at www.securityplusonline.co.uk/LG

Does poor AV performance turn you off?


Anti-virus may have become an In addition, 25% of the users “Everyone is trying to find the right
essential part of everyone‟s security admitted to turning off their anti- security product which can
infrastructure, at home and at work, virus protection because they effectively balance protection and a
but a survey by leading anti-virus thought those programs were computer‟s resource usage” said
vendor Avira has discovered that slowing down their computers! Sorin Mustaca, data security expert
more than 60% of respondents have of Avira.
tried multiple anti-virus products The questions were posed to over
over the course of a year. 100 million people worldwide, giving “The scary take-away from this
the survey an international flavour. survey is that 25% of the
Here are the top findings from respondents admitted to just turning
25% of users admitted to Avira‟s recent security survey: off their security products because
turning off their anti- they feel that it hurt the
 62% have tried multiple security performance of the machine. That‟s
virus protection because
products in a one-year span on not a good idea because such a
they thought those the same computer. practice leaves the computer totally
programs were slowing exposed to even the simplest of
 25% turned off the anti-virus viruses.”
down their computers. software because it was slowing
Avira Anti-Virus Survey down their computer.
 12% thought about not using the
internet due to safety reasons.

Page 16 request your free licence at www.securityplusonline.co.uk/Avira


Insecure web applications?
Wake up and smell the coffee!
The recently published “State of 88% spend more on coffee than countermeasures required for web
Application Security Survey” securing Web applications. In application security,” said Dr. Paul
from Barracuda Networks, Cenzic addition, 69% of organisations Judge, chief research officer and VP
Inc. and the Ponemon Institute has rely on network layer firewalls to for Barracuda Networks. “The fact
underscored the lack of adequate protect their websites (leaving web that 69% of respondents are relying
protection currently in use and applications wide open for attack) upon network firewalls to secure
overall insufficient resources and while most organisations test less web applications is like relying upon
knowledge around Web application than 10% of their web applications a cardboard shield for protection in
security. for security flaws. a sword fight – eventually your
shield will prove that it's insufficient
The headline finding was that while “There still seems to be a real and an attack will reach you that
website attacks are the biggest disconnect between the desire and can fly past a network firewall.”
concern for companies, implementation of security

WinMagic launch Lenovo partnership


Lenovo and WinMagic have delivers fully-managed software encryption and multi-factor
announced SecureDoc for Lenovo, encryption for PCs without self- authentication, but also to
a full-disk encryption (FDE) encrypting hard drives, providing integrate Lenovo‟s Rescue and
solution for central management of flexibility and a migration path for Recovery program,” said Garry
new self-encryption hard drives. large organisations with strong McCracken, vice president,
security requirements. Technology Partnerships, WinMagic
Lenovo ThinkPad laptops and Inc. “With full-disk encryption
ThinkCentre desktops will now be “WinMagic believes it should be as transparent, users don‟t have to do
among the first PCs to offer Opal simple to work on an encrypted anything extra to protect their
standard FDE drives for an device as an unencrypted device, data, ensuring no impact to user
enhanced level of security and and we‟ve worked with Lenovo to productivity and compliance with
manageability for IT not only provide PCs with company data security protocols.”
administrators. SecureDoc also transparent, built-in full-disk

Frost & Sullivan name Websense the


content security leader for 2010
Validating years of content security category that includes email "More customers buy Websense
innovation and vision, Frost & security, web security and data over other vendors because
Sullivan recently awarded security (DLP). Websense received Websense content security
Websense with the 2010 Global this award for ongoing content solutions go so much further than
Market Share Leadership of the security growth, innovation, and simple content filtering," said Frost
Year Award for Content Filtering leadership, and tens of thousands & Sullivan Global Program Director,
Products. of companies have already selected Robert Ayoub. "Our research found
Websense for their content security that the TRITON integrated web,
Just one of many recent accolades, protection and for the innovative email and data solutions distinguish
this recognition shows that Websense® TRITON ™ solutions Websense from all other
Websense is clearly the choice for that offer flexible, cost-effective competitors in the marketplace.”
organisations worldwide when they deployment options.
need real-time content security, a

Page 17
e92plus Technical Services:
We‟re here to make business easier
At e92plus, we provide extensive value added services to help you grow your business profitably - including sales
assistance and a wide range of marketing services including lead generation, email marketing and events.

In addition, our Technical Support is here to help you secure your customers' business. From Accredited Training, to
Installation, to Support, we help add value through our years of experience and product knowledge.

At e92plus we are dedicated to towards ensuring everything is


helping our resellers grow their running smoothly.
business, and that includes
providing the best technical This covers the majority of our
support. products – from anti-virus to UTM
firewalls to advanced SSL-VPNs.
That‟s why orders and evaluations
placed with e92plus now come with It means that your team can work
installation included. This covers with e92plus on-site, ideal for new
one day‟s installation on-site with technologies, or simply let us
an e92plus engineer, helping manage the whole process for you.

To help ensure your customers are Plus, it‟s a great way to explore
getting the most from their additional opportunities around
investment, e92plus now include a new or complementary products
free Security Healthcheck with and increase the value of the
every renewal. business to you with that customer.

This is a fantastic way of ensuring This service is available for all of


that the solution is still working our products, and is offered with
fully, the end-user understands all every renewal you order through
the features and it is optimised for e92plus.
their environment.

If you don't have the technical e92plus Support Contracts provide


expertise in-house, don't worry. Business Day, 8x5 Support. Most
With e92plus Support Contracts importantly, our Support Contracts
you can provide a full 8x5, SLA- are SLA (Service Level Agreement)
backed Support Service. We backed which means that we
provide all the support you need to guarantee response times and
provide peace of mind to your make sure you know that we are
customers, including telephone & working on a fix.
email Support plus Remote
Assistance.

Find out more today!


These are just some of the ways e92plus are working with our reseller partners to help grow their business. For
more information on these value added services supplied by e92plus, and for full terms and conditions, please visit
www.e92plus.com/technical.

Page 18
e-centives is the fantastic Rewards Portal from e92plus - and with new
programmes available, there has never been a better time to sign up and
start getting rewarded!

Every time you place a qualifying order with e92plus, you can earn
e-centive points. These points are collected across all the different
schemes - see below for more details - and can be saved for as long as
you want.

This means that you can spend your points on thousands of great
gifts instantly, from DVDs to a new iPad, or even save them up for a
summer holiday!

For every order over £250 for any All orders for Barracuda model Complete at least 2 ESG „Guru on
of Avira‟s Anti-Virus products (not series 400 and above will be the GO‟ training sessions and log
including renewals) you can earn eligible for e-centives points. The a deal registration for over 250
points to spend on fantastic larger the appliance, the more seats and you will be able to
e-centive rewards. points you will receive! claim e-centives points.

Order Value Points Model Series Points


Activity Points
£250 - £499 105 4xx 250

£500 - £749 175 Complete training


6xx 500
and
£750 - £999 245 8xx 2000 log a 250+ seat deal 350
registration with
£1000+ 350 9xx and above 4000 Websense

Here’s a small selection of the


rewards available online.

Need more information?


You can register, check your points and
learn more about all these programmes
at www.e-centives.co.uk.
Coming 1,232 points 1,050 points 1,911 points
The above offers are for a limited time Soon!
only, so don‟t delay. Full terms and
conditions of the above offers can also
be found on the e-centives website.

Don‟t forget, you can contact us on


020 8274 7000 or email us at
e-centives@e92plus.com
168 points From 700 points 616 points

request an account at www.e-centives.co.uk Page 19


With over 145 million customers, Barracuda Networks is the Celestix Networks is the premier
Avira is the fastest growing Anti- worldwide leader in appliance developer of Microsoft Windows–
Virus company in Europe. based Email and Web Security. based security appliances.

Cyberoam‟s range of feature-rich Drobo delivers enterprise class EncryptStick transforms any USB
UTM appliances are suitable for SAN and File Storage with great Flash Drive into a Digital Privacy
both small and large businesses. reliability and ease of use. Manager to keep files secure.

LG Network Monitors enable a Lumension Security provides NComputing provide simple and
single PC to be easily shared by unified protection and control of affordable desktop virtualisation
up to 31 individual users endpoints, apps and devices. solutions.

VASCO is the number one Websense is a global leader in WebSpy analysis and reporting
supplier of strong (Two-Factor) integrated Web security, Data software transforms log file data
authentication services. security and Email security. into manageable information.

WinMagic‟s SecureDoc hard disk Xirrus manufacture leading Wi-Fi


encryption secures a laptop or Array architecture replaces both
PC‟s sensitive information. wireless and wired networks.

tel fax email


e92plus Limited 020 8274 7000 020 8274 7002 marketing@e92plus.com
Argent House, Hook Rise South, web
Surbiton, Surrey, KT6 7LD www.e92plus.com www.securityplusonline.co.uk

You might also like