PRODUCTS

News

6

Jun

 certification level for what is now an essential application delivery requirement.

Array’s new IPv6-enabled and gold-certified solutionsprovide a flexible and seamless gateway capable of delivering IPv4 resources to IPv6 clients, delivering IPv6 resources to IPv4 clients, and enabling secure and efficient application delivery in pure IPv6 environments. Powered by Array’s award winning SpeedCore platform and leveraging the latest in 64-bit multi-core processing technology, APV Series application delivery controllers support the performance and scalability to accommodate the larger
address space of IPv6 and ensure compatibility with IPv4 systems.

For more information click here

6

Jun

work flawlessly with their cellular carriers and modems.

 

To help you locate compatible modems fast, the new 4G/3G Modem Support page was created. Peplink/Pepwave products support 100+ cellular modems worldwide and this comprehensive reference and powerful search, making it quick and easy to find out which modems the Balance and MAX routers support in your region.

For the 4G/3G Modem Support page click here

6

Jun

spread the Flame malware from machine to machine.

Flame-infected computers can be instructed to impersonate a Web Proxy Autodiscovery Protocol (WPAD) server. Windows machines set for automatic proxy detection (the default) will try to contact a server called wpad.(company domain name) to check for instructions for when to use a HTTP proxy.

Flame would tell machines on the network that the infected computer was to be used for proxying requests to Microsoft’s Windows Update service. Ordinarily this would not work, as Microsoft signs updates with their special digital certificates to ensure you only receive updates that are tamper proof.

For more information click here

6

Jun

there will be 1.5 Billion viewers of online video by 2016, up from 792 million in 2011.

Global IP traffic is expected to hit 1.3 Zb (10^21) per year or 110 Exabytes (10^18) per month by 2016 – nearly a fourfold increase from approximately 31 Eb per month in 2011.

Factors identified by the report as driving global broadband traffic growth and service penetration include: an increasing number of devices (with network connections nearly doubling to 18.9 billion by 2016), more internet users (reaching 3.4 billion by 2016), faster average broadband speeds (rising fourfold to 34Mbps), more video (reaching 1.2mn video minutes being transmitted every second) and growth in wifi.

For Ipoque’s advanced traffic management solutions click here

17

May

Sophos Mobile Security for Android [BETA] in Google Play.

So, what does this application actually do?

  • protects Android smartphones and tablets from malicious apps and other risks
  • locates a lost or stolen device
  • locks a stolen device
  • scans the apps on your device and cross-check them with the latest security expertise from Sophos Labs

For more information click here

11

May

balancing solution for Lync Server 2010. Array’s APV Series application delivery controllers ensure the availability of Lync services by optimizing resource utilization, maximizing throughput, minimizing response times and ensuring a seamless user experience in the event that application servers become unavailable. Moreover, the joint Array and Microsoft solutions deliver compelling economics and value versus alternative load balancing solutions for enterprises running Lync 2010 unified communications.

Solution Highlights

Array’s APV Series application delivery controllers can provide connectivity to multiple front-end servers in an enterprise pool, provide connectivity to multiple directors in an array or provide connectivity to both internal and external network interface cards (NICs) for multiple edge servers in an array.

Essential functions performed by Array APV Series application delivery controllers deployed for Lync Server 2010 include:

  • Intelligent load balancing of Lync services across multiple servers
  • Service persistence to PCs, laptops and mobile devices including tablets and smart phones
  • Health-checks forLync services to detect failed or overloaded servers and automatically re-route traffic
  • Offloading of connection management and other non-core Lync functions from application servers to dedicated appliances for optimized performance
  • Local and global availability of services with seamless redirection of users in the event of server or site failure
  • Protection of Lync servers from DDoS attacks
  • Scalability from ten to tens-of-thousands of concurrent users on a single appliance, with the ability to cluster up to 32 APV Series appliances for unlimited scalability

For more information click here

8

May

back up the same data, such as performing nightly backups each business day, or backing up of dozens of VMware virtual machines across multiple physical hosts, said experts at Arkeia Software, a leading provider of fast, easy-to-use and affordable network backup solutions. Although reduction ratios are highly variable, and depend on the type of data and files on the network, significant reductions in time, capacity and costs can be achieved with the right dedupe strategy.

Below are five tips for choosing the right technology to deliver fast, simple, and more affordable dedupe.

1. Start at the source

2. Get in-line

3. Go around the block

4. Replication acceleration

5. Go all in

If you want to find more details about the upper steps, click here

2

May

year’s Networkshop 40 exhibition in York, England. Ιpoque’s Traffic Manager products were featured again this year.

The exhibition was intended for network managers and technical staff at Great Britain’s higher education institutions, among them ipoque customers such as the universities of Hull and York. Universities often have huge data rates and special requirements for their networking technology. Students in dorms connected to the university network expect reliable Internet connectivity; at the same time, they are heavy users of bandwidth-intensive services such as BBC iPlayer in Great Britain. As a result, overall network performance can be substantially degraded.

For more information click here

27

Apr

to offer new things to stay fresh and competitive but also secure. Therefore Facebook teamed up with Sophos, in order to catch and annihilate scams before they impact huge numbers of users that Facebook attracts every day. 

Ultimately, Sophos Labs constantly collect and sort mountains of data on malicious and scammy links. Sharing this info with Facebook means that the social platform can get a heads up on scams before they become a problem for large numbers of users.

As an added bonus, Sophos is giving away its Sophos Anti-Virus for Mac: Home Edition !!

For more information click here

25

Apr

network connections more reliable, more configurable, and faster than ever. Previously known as Site-to-Site VPN, SpeedFusion bundles existing Peplink bonding technologies to create a single distinct and memorable brand, as well as offering an array of enhanced features.

Peplink’s patent-pending SpeedFusion bonding technology unifies a number of industry-leading Peplink technologies, including the ability to seamlessly bond up to 13 links from various service providers and automatic link failover. SpeedFusion branding will launch with the release of Balance Firmware 5.4.

For more information click here

28

Mar

racks without disruption to your network.

interSeptor iMeter is a flexible, scalable and ultimately extremely powerful solution that enables IT departments to monitor the power flowing into racks and the environmental conditions in and around those racks.

iMeter can monitor up to 600 of the following sensors from a single IP address:

  • Current (Amps) using our unique intelliAmp® current sensor (pictured above)
  • Voltage
  • Temperature
  • Humidity
  • Airflow
  • Water Leak
  • Security (door contact or motion)
  • Smoke

For more information click here

27

Mar

Gartner, Inc’s 2012 Magic Quadrant for Unified Threat Management. The quadrant is based on an assessment of a company’s ability to execute and completeness of vision.

According to the report, “The Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens.

For more information click here

19

Mar

various trust levels. Digital IDs can be used for a number of secure communications functions, including; secure email (S/MIME), authentication to online services and add digital signatures to Microsoft Office and other electronic documents to protect the document’s integrity and provide assurances of authorship to recipients.

For more information click here

29

Feb

Every year, Open-E meets up with partners, customers and all who are interested in Open-E to present the newest innovations.

CeBIT 2012
06 – 10 March 2012 – Hannover
Germany

Visit Open-E in
Hall 15, Stand D42/1

20

Jan

 swindle $6.7 million out from under that system’s nose.

As the South African Times Live reported on Sunday, the high-tech heist is believed to have been carried out by a cybercrime syndicate with in-depth knowledge of the IT systems in question.

The bank, Postbank, is part of the South African Post Office. It holds about $500 million in deposits and oversees the movement of millions of rands in social grants each month, according to Times Live.

For more information click here

13

Jan

 Top 10 Products for 2011.

This award highlights the favorite products of 3Gstore’s customers and tech support personnel and is based on the following criteria:

  • Customer reviews and feedback
  • Customer return rates
  • Tech support issues

The Pepwave Surf Mini is a versatile Wi-Fi bridge that allows users to connect to a Wi-Fi source and then repeat, relay, and extend that connectivity wirelessly. The Surf Mini also makes it easy to convert from wireless to wired access via an Ethernet port on the bridge. Whether you’re on the move, at the office, or even relaxing at home, Pepwave’s Surf Mini is a powerful, flexible, and space-saving connectivity solution.

For more information about Pepwave Surf Mini click here

11

Jan

the past 12 months and on how we can better ourselves in the coming year.

Astaro, Sophos Network Security, urge you to consider committing to resolutions that will help secure your personal and business networks. Below are some suggestions for resolutions:

1. I will not access the Internet without up to date malware protection and an installed firewall and antivirus.

Why? Last year 150,000 malware attacks were registered daily! If only everybody would install sufficient security software, this threat would be minimalized.

2. I will not click on tinyURLs, hyperlinks or links of unknown origin without investigating first.

Why? Even if you think you know the sender or the site, this won’t guarantee your safety. 80% of these URLs stem from former legitimate pages, which were either hacked or infected.

3. I will update my security software package regularly and with a watchful eye!

Why? Fake antivirus software and SEO poisoning are the number one way malware is spread. Therefore stay alert and don’t blindly install updates, make sure they are from your provider. Otherwise, you are opening the door for new security breaches.

4. I will not wait until my laptop is stolen or lost before I encrypt data!

Why? Loss or theft of hardware makes up 30% of all data loss scenarios. Do your best to physically protect your hardware, but also make sure information is encrypted in case these precautions fail.

5. I will stop using “password” as my password

Why? In 2011, passwords such as “password”, “123456”, “qwerty” and “abc123” were still topping the most used passwords list*. Moreover, 67% of all mobile device users haven’t installed any password protection at all. A secure password can go a long way towards protecting your data.

11

Jan

subjects or areas of usability between NSS products.

NSS takes under consideration the unique needs of modern enterprises and organisations, that are continuously changing because of today’s competitive marketplaces. NSS has designed innovative solutions using its products, that improve employee efficiency and productivity, enhancing responsiveness to customers, suppliers and partners with an affordable Total Cost of Ownership (TCO).

The main criteria in NSS for the product selection process are:

  • The Ease of Use for the Management of a product
  • The ability of Integration of products to other products and solutions
  • The logic of Total Cost of Ownership (TCO) with respect to functionality

All of the illustrated solutions fully adapt to specific customer needs independently of the size or the area of expertise of a company or organization following our basic principle of “Affordable Cutting Edge”.

15

Dec

the AP50 device.

The AP50 is a dual-band/dual-radio wireless access point that operates in both the 2.4 and 5 GHz WLAN frequency bands and features:

  • 802.11 a/b/g/n support
  • 300 Mbits throughput
  • PoE+ compatibility
  • Gigabit Ethernet interface
  • Support for up to 50 users

The AP50 provides fast and reliable WLAN for more flexibility and is less vulnerable to interference, even in congested environments. Generally with the Astaro Security Gateway centrally acting as a wireless controller, Astaro’s access points are the easiest and most cost-effective way to secure your wireless networks.

For more information about the new Sophos AP50 click here

 

8

Dec

providing the deepest support of storage platforms in the network and data backup to the mid-market enterprise.

While Arkeia has supported the NetApp product line for almost 10 years, this partnership allows Arkeia to deepen its support of NetApp’s NAS and SAN storage products, as well as the NDMP open source standard for data management. Whether the need is to protect a virtualized environment, a traditional data center, or data in the cloud, Arkeia and NetApp work together to maximize the benefits to the customer.

More information about this partnership click here