VMworld

F5 Networks: a full proxy architecture to improve security and efficiency - Interview with Paul Pindell - Senior Solution Architect - F5 Networks

f5 logo

F5 Networks has a modern platform that unfortunately isn’t widely known; we have talked with Paul Pindell, Senior Solution Architect at VMworld 2015.

 

Let’s start with the offer of F5 Networks and try to better understand what you do

F5 Networks offer a full proxy architecture that allows to analyze all the traffic that enters and goes out the business walls and its branches. Traffic gets analyzed and decrypted even if chypred standards, like SSL, are used. Out technologies then operate on the whole traffic to perform several functions such as firewall, routing, security management on the application level, acceleration and compression and even a Web content control. The strength of F5 is in the intelligence that allows to manage this architecture.

Read more ...

Fortinet is ready for all the SDN architectures - Interview with Jason Bandouveres - Director and Product Management Fortinet

jason fortinet picc
During VMworld we ad the chance of meeting Jason Bandouveres, Director and Product Management for Fortinet’s virtualized solutions.

What do you think about the presence of Fortinet here at WMworld and the position of your company with regards to the evolutions of the threats for security?

Fortinet is a company with 15 years of experience in the network and system protection field, and it’s ready to face all the novelties that the Software Defined systems are bringing. Fortigate, out most known and used product, is one of the most complete UTM (Unified Threat Management) and has some fundamental features, like an Operative System that has been developed internally and profoundly optimized (FortiOS), an internally developed antivirus engine and a system dedicated to the protection against 0-day threats.

Read more ...

Trend Micro has a product dedicated to smaller companies - Interview with Albert Kramer - Technical Manager Continental Europe - Trend Micro

albertkramer picc

We had the pleasure of chatting with Albert Kramer, Technical Manager Continental Europe Trend Micro, at WMworld; we talked about security.

 

How does Trend Micro face the small and medium businesses market that is so widespread in Italy?
Trend Micro offers different product for private users and companies, in particular we have two solutions for the protection of small-medium companies and another for the bigger ones, so that we can offer a specific product for every kind of client.

The small and medium companies solution can be directly managed by Trend Micro for the companies that haven’t got an IT staff, or it can be managed by an internal/external IT if present.
The more advanced version of the Worry-Free Business Security suite that we offer on the SMB market can handle servers, virtual machines, mobile devices and mail servers without any particular difficulty on a technical aspect.

 

That naturally doesn’t mean to exclude the bigger companies…

No, we have indeed a 360° product line for every needs.
In addition to a dedicated suite for the Enterprise tier companies, we support the integration with VMware NSX and we even offer dedicated solutions for datacenters and cloud infrastructures.

 

And how do you relate with respect to Managed Service Providers and resellers?
We have a program of actions and products dedicated to this category of users with specific solutions for MSPs, hosted security systems for, say, email security and management dashboards with SSO features.

A really complete offering even for a category so heterogeneous and hard to fulfill.

BYOD with mobile devices is finally secure and protected with our platform - Itai Greenberg - Head of Datacenter Security Business - Check Poin

checkpoint
Among the people we have met for you at VMworld 2015, there’s Itai Greenberg, Head of Datacenter Security Business for Check Point.

 

Good day Itai, let’s start with a brief introduction of the company, for those who don’t know Checkpoint yet and its role in the world of security.

 

Check Point is an Israeli company, the absolute leader in its sector, it protects more than 100.000 companies and covers all the levels of security, from Mobile to Cloud, through Datacenter. As we are at VMworld, I’d like to highlight that our coverage for hypervisors and our Software-Defined protection are total: we support NSX as well, the protection on a hypervisor level and we can promptly intervene on VM by locking the connections to a network if a malicious infection is revealed.

 

How do you manage the protection of mobile devices? By means of a traditional anti-virus program?

MTP DashboardThe Dashboard of Check Point's Mobile Threat Prevention No, the protection of mobile devices is fundamental for us, so we use an extremely sophisticated solution called Check Point Capsule: it’s a separated environment dedicated to the business applications that runs inside smartphones and tablets (Android and iDevices) and can handle emails, contacts, agenda, notes, shared files and Remote Desktop connections with no level of interaction with the main applications installed on devices. Aiming for a BYOD (Bring Your Own Device) finally secure and protected. A management connection for controlling terminals in a centralized way is naturally present.

 

Do you have a managed solution of your product for desktop and servers? Do you allow Managed Service Providers and resellers to manage the situation of their own clients without having to access to a multitude of console, one after another?

Surely, our product can be managed by resellers -and their clients- when we are in an environment where an internal IT is present, and by Check Point itself for Cloud based solutions.

 

Do you have any technology that goes beyond the traditional antivirus protection? To overcome the concept of identification with signatures and obtaining a more prompt time of intervention? For instance, in the case of Ramsonwares like Cryptolocker?

Check Point Sandblast, included in our Next Generation Prevention line, is a proprietary technology that aims to that goal. The recent attacks often use well-known vulnerabilities and modified signature to avoid to be identified.
The variations that are created allow to not be identified by traditional antiviruses. Sandblast offers a protection to 0-day attacks by identifying exploits on a CPU level and a prompt protection against malware not already revealed.

A custom tailored garment for the client - Interview with Matteo Uva and Hervé Renault - VMware

uva renault

During VMworld we interviewed Matteo Uva (Channel Manager - VMware) and Hervé Renault (Senior Director Partners & General BUsiness Souther Europe, Middle East, Africa - VMware).

Beside the news introduced in this VMworld, how does VMware deal with such a particularly fragmented channel that faces with difficulties the innovations and new technologies?
(Hervé Renault replies) VMware is well positioned in the channel and tries to take advantage of the distributors and resellers to better face the difficult panorama of small and medium businesses in Italy.
The never-stopping evolution of technologies must make us to continuously change, aiming to understand the needs of the clients and offering the best product in every situation.

Read more ...

banner eng

fb icon evo twitter icon evo

Word of the Day

The term Edge Computing refers, when used in the cloud-based infrastructure sphere, the set of devices and technologies that allows...

>

The acronym SoC (System on Chip) describes particular integrated circuit that contain a whole system inside a single physical chip:...

>

The acronym PtP (Point-to-Point) indicates point-to-point radio links realized with wireless technologies. Differently, PtMP links connects a single source to...

>

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline...

>

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  •  GURU advisor: issue 21 - May 2019

    GURU advisor: issue 21 - May 2019

  • GURU advisor: issue 20 - December 2018

    GURU advisor: issue 20 - December 2018

  • GURU advisor: issue 19 - July 2018

    GURU advisor: issue 19 - July 2018

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1