PRODUCTS

News

25

Apr

network connections more reliable, more configurable, and faster than ever. Previously known as Site-to-Site VPN, SpeedFusion bundles existing Peplink bonding technologies to create a single distinct and memorable brand, as well as offering an array of enhanced features.

Peplink’s patent-pending SpeedFusion bonding technology unifies a number of industry-leading Peplink technologies, including the ability to seamlessly bond up to 13 links from various service providers and automatic link failover. SpeedFusion branding will launch with the release of Balance Firmware 5.4.

For more information click here

28

Mar

racks without disruption to your network.

interSeptor iMeter is a flexible, scalable and ultimately extremely powerful solution that enables IT departments to monitor the power flowing into racks and the environmental conditions in and around those racks.

iMeter can monitor up to 600 of the following sensors from a single IP address:

  • Current (Amps) using our unique intelliAmp® current sensor (pictured above)
  • Voltage
  • Temperature
  • Humidity
  • Airflow
  • Water Leak
  • Security (door contact or motion)
  • Smoke

For more information click here

27

Mar

Gartner, Inc’s 2012 Magic Quadrant for Unified Threat Management. The quadrant is based on an assessment of a company’s ability to execute and completeness of vision.

According to the report, “The Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens.

For more information click here

19

Mar

various trust levels. Digital IDs can be used for a number of secure communications functions, including; secure email (S/MIME), authentication to online services and add digital signatures to Microsoft Office and other electronic documents to protect the document’s integrity and provide assurances of authorship to recipients.

For more information click here

29

Feb

Every year, Open-E meets up with partners, customers and all who are interested in Open-E to present the newest innovations.

CeBIT 2012
06 – 10 March 2012 – Hannover
Germany

Visit Open-E in
Hall 15, Stand D42/1

20

Jan

 swindle $6.7 million out from under that system’s nose.

As the South African Times Live reported on Sunday, the high-tech heist is believed to have been carried out by a cybercrime syndicate with in-depth knowledge of the IT systems in question.

The bank, Postbank, is part of the South African Post Office. It holds about $500 million in deposits and oversees the movement of millions of rands in social grants each month, according to Times Live.

For more information click here

13

Jan

 Top 10 Products for 2011.

This award highlights the favorite products of 3Gstore’s customers and tech support personnel and is based on the following criteria:

  • Customer reviews and feedback
  • Customer return rates
  • Tech support issues

The Pepwave Surf Mini is a versatile Wi-Fi bridge that allows users to connect to a Wi-Fi source and then repeat, relay, and extend that connectivity wirelessly. The Surf Mini also makes it easy to convert from wireless to wired access via an Ethernet port on the bridge. Whether you’re on the move, at the office, or even relaxing at home, Pepwave’s Surf Mini is a powerful, flexible, and space-saving connectivity solution.

For more information about Pepwave Surf Mini click here

11

Jan

the past 12 months and on how we can better ourselves in the coming year.

Astaro, Sophos Network Security, urge you to consider committing to resolutions that will help secure your personal and business networks. Below are some suggestions for resolutions:

1. I will not access the Internet without up to date malware protection and an installed firewall and antivirus.

Why? Last year 150,000 malware attacks were registered daily! If only everybody would install sufficient security software, this threat would be minimalized.

2. I will not click on tinyURLs, hyperlinks or links of unknown origin without investigating first.

Why? Even if you think you know the sender or the site, this won’t guarantee your safety. 80% of these URLs stem from former legitimate pages, which were either hacked or infected.

3. I will update my security software package regularly and with a watchful eye!

Why? Fake antivirus software and SEO poisoning are the number one way malware is spread. Therefore stay alert and don’t blindly install updates, make sure they are from your provider. Otherwise, you are opening the door for new security breaches.

4. I will not wait until my laptop is stolen or lost before I encrypt data!

Why? Loss or theft of hardware makes up 30% of all data loss scenarios. Do your best to physically protect your hardware, but also make sure information is encrypted in case these precautions fail.

5. I will stop using “password” as my password

Why? In 2011, passwords such as “password”, “123456”, “qwerty” and “abc123” were still topping the most used passwords list*. Moreover, 67% of all mobile device users haven’t installed any password protection at all. A secure password can go a long way towards protecting your data.

11

Jan

subjects or areas of usability between NSS products.

NSS takes under consideration the unique needs of modern enterprises and organisations, that are continuously changing because of today’s competitive marketplaces. NSS has designed innovative solutions using its products, that improve employee efficiency and productivity, enhancing responsiveness to customers, suppliers and partners with an affordable Total Cost of Ownership (TCO).

The main criteria in NSS for the product selection process are:

  • The Ease of Use for the Management of a product
  • The ability of Integration of products to other products and solutions
  • The logic of Total Cost of Ownership (TCO) with respect to functionality

All of the illustrated solutions fully adapt to specific customer needs independently of the size or the area of expertise of a company or organization following our basic principle of “Affordable Cutting Edge”.

15

Dec

the AP50 device.

The AP50 is a dual-band/dual-radio wireless access point that operates in both the 2.4 and 5 GHz WLAN frequency bands and features:

  • 802.11 a/b/g/n support
  • 300 Mbits throughput
  • PoE+ compatibility
  • Gigabit Ethernet interface
  • Support for up to 50 users

The AP50 provides fast and reliable WLAN for more flexibility and is less vulnerable to interference, even in congested environments. Generally with the Astaro Security Gateway centrally acting as a wireless controller, Astaro’s access points are the easiest and most cost-effective way to secure your wireless networks.

For more information about the new Sophos AP50 click here

 

8

Dec

providing the deepest support of storage platforms in the network and data backup to the mid-market enterprise.

While Arkeia has supported the NetApp product line for almost 10 years, this partnership allows Arkeia to deepen its support of NetApp’s NAS and SAN storage products, as well as the NDMP open source standard for data management. Whether the need is to protect a virtualized environment, a traditional data center, or data in the cloud, Arkeia and NetApp work together to maximize the benefits to the customer.

More information about this partnership click here

8

Dec

 unknown attacks, malware, spyware, unwanted programs and spam, and total network access control solutions (NAC), Sophos.

Sophos helps organizations keep their data safe and stop the growing number of complex threats. Sophos provides a full range of endpoint, encryption, email, web and NAC products, helping customers protect their businesses and meet compliance needs. Sophos makes products easy to install and use, so you spend less time managing security.  And all Sophos customers benefit from the expertise of Sophos threat analysts around the world. Their research is at the heart of everything we do. They find the latest threats fast and update protection for customers automatically. Plus Sophos support engineers are experts on all  products, and they’re there whenever you need them.

With Sophos you can focus on the needs of your business because we’re securing your entire organization.

For more information about Sophos click here

3

Nov

Exchange 2010 and are now listed on Microsoft site.

After several rounds of testing, documentation and editing among engineering, QA, marketing with Microsoft, Array Networks has completed the Microsoft qualification process for Exchenge 2010.

Microsoft Exchange Server provides businesses with email, calendar, and contacts on the PC, phone & web, so employees can stay connected and in sync.

Array Networks provides a comprehensive solution for Exchange Server 2010 that enables organizations to optimize their Exchange deployment by accelerating performance and enhancing security and availability of Exchange services while maximizing the ROI of the overall solution.

For more information click here

26

Oct

worldwide traffic patterns in real-time.

Internet Observatory is the successor of ipoque’s Internet Studies, which have been a reliable source for traffic information ever since they were first published in 2006. Although comprehensive, the studies were just snapshots of traffic patterns during a certain time period. Now, with the Internet traffic mix always changing and new applications, particularly in the mobile space, constantly appearing in the market, it is time for something new: Internet Observatory traffic statistics are available live, 24 hours a day, with long-term views instead of just a snapshot.

For more information click here

24

Oct

cybercriminals taking advantage of the news story, and the general public’s seeming interest in viewing ghoulish photos and videos of his last moments.

Malicious hackers have spammed out an attack posing as pictures of Gaddafi’s death, tricking users into believing that they came from the AFP news agency and are being forwarded by a fellow internet user. Sophos anti-virus products detect the malware proactively as Mal/Behav-103.

For more information click here

 

21

Oct

samples every day. That’s a 60% increase as compared to malware analyzed in 2010.

Twice a year Sophos publishes its Security Threat Report. Included within this document is the treat scenario statistics, which evolved very dynamic in the first six months in 2011. The numbers once more highlight the importance of reliability in terms of successful IT security and gives you a compact insight into the threat landscape of the first six months in 2011. Since the start of the year, SophosLabs has seen 150,000 malware samples every day. That’s a 60% increase as compared to malware analyzed in 2010.

SophosLabs have also seen 19,000 new malicious URLs each day in the first half of this year. This makes a new internet threat every 4.5 seconds. Even worse, 80% of those URLs are legitimate websites that were hacked or compromised. Another focus of the survey is the fast growing usage of mobile devices, whose security risks are commonly underestimated by now.

For more information about this survey click here

10

Oct

 do so by an ever growing e-mail flood. In real terms, this leads to mail server capacity problems. As a result, servers may become slow and unstable and ordinary maintenance routines can take a disproportionate amount of time – or users are forced to limit their e-mail volume and thus store their e-mails in PST-files locally, that are not backup up and therefore are into a continuous risk.

For the reasons that mail archiving should be your priority click here

4

Oct

racks with the new interSeptor Pro.

interSeptor Pro is an advanced ethernet Data Centre and Rack Monitoring System that monitors room and rack environmental conditions and provides early warning alerts in the event of air-conditioning failure and other conditions that may threaten business continuity.

In addition, interSeptor Pro can also be used to extensively record temperature/humidity data for graphing and analysis helping you not only to ensure your IT equipment is running under optimal conditions but also to quickly identify where air-conditioning systems could be run more efficiently to maximise energy savings.

Designed for ease-of-installation and use, interSeptor Pro is available in 3 models:

  • 8-Port with 8 x Temperature & Humidity Sensors
  • 16-Port with 16 x Temperature & Humidity Sensors
  • 24-Port with 24 x Temperature & Humidity Sensors

 

For more information about interseptor Pro click here

4

Oct

the Pepwave MAX HD2 and Pepwave Phoenix Wireless Basestation, and also provided more information on the Peplink Balance, Pepwave MAX, Pepwave Outdoor Wi-Fi, and other category-leading networking solutions.

Event Details

Dubai, United Arab Emirates
Dubai International Convention and Exchibition Centre
Z-N1, Za’abeel Hall
9 – 13 October 2011

For more information about Peplink participation click here

24

Aug

Complexity by Eliminating Tape Transport by Truck.

Arkeia Software, a leading provider of fast, easy-to-use, and affordable network backup solutions announced availability of a multi-tenant cloud storage solution that is ideal for hosting providers. Arkeia also offers special pricing that adapts to the pricing models that hosting providers offer to their customers. Replication of backup sets to the cloud eliminates the complexity and delays of transporting tapes by truck, and allows hosting providers to offer and respect aggressive recovery time objectives (RTOs).

For more information click here