Supercharge your revenue stream

Get your clients IT security sorted with quality products backed by excellent services and support.

What we are all about

Since opening our doors in 1998 we learned that being a leader in the IT Security Market requires the right strategy, the best team and an excellent supporting structure. Although these components are important, to be a leader in any market is determined by the way you lead by serving.

 

At Netxactics we work to lead by example, by serving the channel and our customers with passion, integrity, excellence and innovation. We will never claim to be perfect, but we will always stay in the game and remain committed to making sure end results are met.

What we do

Products

Sales

Services

Marketing

Our products are of the highest quality because we believe each client should get the quality they expect when it comes to IT security.

Our readily available account managers will assist with any sales queries, product or services quotes. We believe in long term sustainable relationships that enable business continuity and growth.

Our products are backed by excellent service and support. Our team is dedicated, qualified and experienced to assist with each of our products. We cover all the bases, from deployment right up to a remote support and reporting.

We offer marketing support to our partners through the creation of email campaigns, and marketing essentials for various applications.

"Love what you do and you'll do it well."

Products

 

 

 

 

 

NETWORK

XG Firewall

The Next Thing in next-gen:

 

Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

 

With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

 

 

SG UTM

The Ultimate Network Security Package

 

With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

 

The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

 

 

Secure Wi-Fi

Super secure super Wi-Fi

 

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

 

  •     Sophos Wireless managed from Sophos Central
  •     One dashboard for an at-a-glance status
  •     Simple deployment and administration
  •     Increased visibility and control
  •     Secure guest access and hotspot setup
  •     Multi-site management and cloud scalability

 

 

Secure Web Gateway

Complete web protection.

 

Sophos Web Gateway

  •     Reliable, globally-deployed cloud infrastructure
  •     Enterprise-grade Secure Web Gateway that’s advanced yet easy to use
  •     Manage all your Sophos Central security from one unified console
  •     Fast Lane technology that can speed up web browsing

 

The web is the number one source of threats, with 80% of them coming from legitimate, trusted sites. Sophos Web Gateway provides security, visibility, and control for all your desktop PCs, Macs, Chrome books, and mobile devices, regardless of how or where they access the web. And you get the simple, elegant management experience that is Sophos Central.

 

 

Secure Email Gateway

Simple protection for a complex problem

 

Sophos Email

  • Fast setup and easy integration
  • Proven anti-virus, anti-Spam, and anti-phishing
  • Email continuity with an end-user, self-service portal; spooling; and emergency inbox
  • Reliable, global Sophos-hosted infrastructure
  • Manage alongside endpoint, the web, and wireless in Sophos Central’s unified console

 

Sophos Email is a secure email gateway engineered to keep businesses safe from all email threats. It simply stops spam, phishing, malware and data loss and keeps your people productive. And if you want to consolidate protection it lets you control email security alongside endpoint, mobile, the web, and wireless protection from Sophos Central’s single interface.

 

 

 

XG FIREWALL DATASHEET

SG UTM DATASHEET

SECURE WI-FI DATASHEET

SECURE  WEB DATASHEET

SECURE  EMAIL DATASHEET

ENDUSER & SERVER

Endpoint Protection

Comprehensive security for users and data

 

Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

 

 

Intercept X

A completely new approach to endpoint security

 

Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection.

 

Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

 

  •     Protect Vulnerable Software
  •     Effective Ransomware Detection
  •     Root Cause Analysis
  •     Add Next-Gen Protection to Your Traditional Security
  •     Simplify Management and Deployment

 

 

Mobile Control

Countless devices, one solution

 

Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

 

  •     Mobile Content Management
  •     Mobile Device Management
  •     Mobile Application Management
  •     Mobile Email Management

 

 

SafeGuard Encryption

Protecting your data, wherever it goes

 

Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

 

 

Server Protection

Security optimised for servers

 

Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

 

  •     Better protection
  •     High-performance security built for servers
  •     Simple to use, including one-click Server Lockdown
  •     Cloud or on-premise management
  •     Security for every platform

 

 

Phish Threat

Reduce your largest attack surface

— your end users

 

A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

 

Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

 

 

Sophos Home

Free protection for home computers

 

Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

 

MOBILE SECURITY DATASHEET

SAFEGUARD DATASHEET

SERVER PROTECTION DATASHEET

MOBILE CONTROL DATASHEET

ENDPOINT PROTECTION DATASHEET

INTERCEPT X DATASHEET

PHISH THREAT DATASHEET

Rapid7 products make your data more productive, unlocking answers you can use to remediate vulnerabilities, detect breaches, enhance IT operations, and more. How? They collect operational data from across your entire ecosystem - logs, endpoints, everything - then apply real-time analytics powered by an unmatched understanding of attackers and IT operations. It’s a process that transforms your data into insight, prioritises it based on your business objectives, and helps coordinate workflow to resolve the problem.

 

 

insightVM

Live vulnerability management and endpoint analytics

 

The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

 

Collect

Automatically collect, monitor, and analyze vulnerabilities on your network.

Prioritise

View real-time risks and leverage custom views tailored to your users.

Remediate

Provide IT with the data they need to fix quickly, then track progress in real-time.

INISIGHTVM DATASHEET

metasploit

Penetration testing software to help you act like the attacker

 

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

Uncover Weaknesses

Find your vulnerabilities with

automated penetration tests powered by the world’s largest

exploit database.

Maximise Impact

Test and harden your people,

processes, and technology in

order of potential impact on

risk reduction.

Remediate Faster

Test your security program to

identify and more quickly fix

exposures.

METASPLOIT DATASHEET

appspider

Web application security testing to close the gaps in your apps

 

SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

 

The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

 

Keep Pace

Collect the info needed to test today’s ever-evolving apps.

Reduce Risk

Reduce risk with every build and remediate earlier in the SDLC.

Play Nice

Hand deliver the right insight the right way to DevOps.

APPSPIDER DATASHEET

insightIDR

Transform your data into actionable insight

 

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Unify SIEM, UBA, and EDR

Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

Detect Attacks Earlier

Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

Prioritise Your Search

Uncover insight that is hidden in user activity, logs, and endpoints,

to make investigations

20x faster.

INSIGHTIDR DATASHEET

insightOPS

Your operations centre for endpoint visibility and infrastructure analytics.

 

InsightOps combines live endpoint visibility with log analytics, creating one console for total

infrastructure awareness.

Centralize Your Data

Easily centralize data from across your infrastructure in one secure location.

Search and Ask

Search logs and ask questions of your endpoints for immediate results.

Find Answers

Find answers with relevant context that enables you to solve problems fast.

INSIGHTOPS DATASHEET

Logentries

Centralized Logging. Simple and Free.

Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

Collect & Centralize

Stream logs from all environments into Logentries’ centralized log server in real-time.

 

 

Search & Analyze

Search using basic keywords or our advanced query language for deeper analysis.

 

 

Visualize & Report

Build charts, graphs and alerts to monitor performance, user behavior and more.

 

API & Integrations

 

 

Open Source Extensions

Enjoy a large library of open source agents, libraries and other tools for extending Logentries’ logging server to meet your needs.

 

 

RESTful APIs

Logentries’ set of APIs makes it easy to leverage Logentries’ centralized logging service in whatever way works best for you.

DOWNLOAD A FREE TRIAL

THE BREACH STOPS HERE

 

Secure access to infrastructure and apps for privileged and end users in the boundaryless hybrid enterprise through the power of identity services.

 

NEXT DIMENSION SECURITY REDUCES RISK BY 50%

 

Centrify redefines security from a legacy static perimeter based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise.

APPLICATION SERVICES

Stop Breaches That Target Apps

 

Centrify Application Services improves end user productivity and secures every user’s access to apps through single sign-on, multi-factor authentication and mobility management. Application Services supports internal users (employees, contractors) and external users (partners, customers).

 

Product Features

APPLICATION SERVICES

Single Sign-on

Protect Cloud and Mobile Applications

One-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. Supports internal users (employees, contractors) and external users (partners, customers). Centrify Application Services provides turnkey SSO access to thousands of popular apps and adding your own takes just seconds with Infinite Apps.

 

Any App.  Any Device.  Anywhere. Internal or External Users.

 

Workflow & Lifecycle Management

Minimize Attack Surface and Risk of Cloud Accounts

From the day they start to the day they depart, manage employees’ access to all their apps from any source: Active Directory, LDAP, Cloud Directory or external identity. Create accounts, automate app requests with workflows and revoke access from all devices when necessary — from a central control point.

 

Access granted. Access removed. Instantly.

 

Adaptive MFA for App Access

Behavior-based MFA for Apps

Implement adaptive access control to apps through MFA without the hassle via SMS, email, voice or secure OTP. Application Services provides context-aware, real-time app access policy based on user behavior.  Leverage your users’ mobile devices as a second factor for app authentication.

 

Protect data.  Simplify access.  From any device.

 

Mobility Management

Stop Breaches that Target Mobile Apps

Identity-based policy is the lifeblood of BYOD. Minimize application threats and improve mobile productivity. Push apps, policy, certificates and more — and pull it all back when devices are lost or stolen.

 

Enable mobility.  Maintain IT control.  One solution.

 

App Gateway

Eliminate VPN Risk with Encrypted, Dedicated, Per-app Access

Traditional VPNs provide full network access, which opens a big security risk — allowing access to your entire network. With App Gateway, only specific apps are made available — reducing the attack surface and allowing IT fine-grained control of who has access to what.

 

Secure access.  Without VPN.  Easy control.

 

 

Device Management

Unified Endpoint Management

Device policy management for desktops, laptops and mobile devices with full Enterprise Mobile Management integrated with a complete identity and access management solution that provides single sign-on while ensuring least privilege to stop breaches that start on endpoints.

 

ENDPOINT SERVICES

Stop Breaches That Start on Endpoints

 

Grant access to apps and infrastructure only from trusted and secured endpoints. Manage and secure your heterogeneous endpoints through a single source of identity and a least privilege access model.

 

Product Features

ENDPOINT SERVICES

 

Application Management

Protect Against Rogue Apps and Malware

Provide a rich enterprise app store that enables end-user self service, silent installation and updates to ensure your endpoints have all the required security components and tools needed for productivity and security all while preventing the need for admin privileges that can lead to the installation of untrusted applications that can spread malware.

Adaptive MFA for Endpoints

Minimize the Risk of Stolen Devices

Ensure access is limited to authorized users with Multi-Factor Authentication at login. Block access to sensitive information from non-compliant devices through role-based access controls.

 

Smart Card and Derived Credentials

Eliminate Passwords Across Apps and Devices

Take security to the next level by ensuring strong authentication via smart cards for workstations and derived credentials for mobile devices and for access to all applications- cloud or on-premises.

 

INFRASTRUCTURE SERVICES

Stop Breaches That Abuse Privilege

 

Minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.

 

IT organizations are increasingly deploying and managing hybrid environments that combine cloud-based and data center infrastructure, while working to mitigate the risk of insider and cyber threats and meet PCI DSS, SOX or other industry mandates and government regulations. Hybrid enterprises require a purpose-built, privileged access security solution that enables centralized control and visibility over privileged access and simplified compliance to protect against the evolving threat landscape.

 

Product Features

INFRASTRUCTURE SERVICES

Identity Broker

The Security of a Single Identity

Consolidate identities and leverage a common enterprise authentication service across on-premises and cloud based infrastructure and apps.

 

Adaptive MFA for Privileged Access

Prove Users Are Who They Say They Are

Add an extra layer of security to stop the breach with risk-aware MFA for IT admins who access Windows and Linux systems, elevate privilege or leverage privileged credentials.

 

Privilege Elevation

Grant Just Enough Privilege

Secure and manage fine-grained privileges across Windows and Linux systems, limiting potential damage from security breaches. Get users to login as themselves for accountability, and elevate privilege based on their role within an organization.

 

Shared Password Management

Control Shared Access to Privileged Accounts

Secure and manage super user, service, and application accounts on servers and network devices, both on-premises and in the cloud. Auto-rotate passwords after checkout. Provide security for the modern enterprise where IT is increasingly outside the firewall with a secure service that is faster to implement and delivers quicker ROI.

 

Privileged Access Request

Self-service, Just-in-time Privileged Access

Minimize your attack surface by eliminating static and long-lived privilege grants. Govern temporary access to roles that grant privilege, shared account credentials and remote sessions with self-service access request and multi-level approvals. Capture who approved access, and reconcile approved access with actual access.

 

Secure Remote Access

Secure Remote Access to Infrastructure Without a VPN

Provide remote admins, outsourced IT and third party vendors with secure access to the specific infrastructure they manage — on-premises and in the cloud. Risk-aware MFA combined with VPN-less access and flexible deployment models deliver the security your hybrid IT environment demands.

 

Session Recording and Monitoring

Monitor, Manage and Record Privileged Sessions

Identify suspicious activity by watching activity in real-time with the option to terminate sessions. Monitor for changes to critical configurations and files enabling triggered security alerts within an SIEM system. Simplify forensic investigation into a breach with high-fidelity video recordings.

 

Auditing and Reporting

Enforce Accountability and Improve Compliance

Record and manage a holistic view of privileged activity across Windows and Linux servers and network devices, establishing single source of truth for individual and shared accounts. Prove compliance with reports on every user’s privileges and associated activity.

 

Virtual Machine Backup for Hyper-V and VMware

Choose a high performance Virtual Backup solution built for small and mid-market businesses

 

Built specifically for small and mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

 

Efficient backup setup

Up and running quickly, without the need for complex configurations!

 

With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

 

Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

 

  • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
  • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
  • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

 

 

Full control of your backups

Powerful and fast centralised full control & scalability

 

Managing and configuring backup/restore jobs across multiple hosts has never been simpler.

 

  • Powerful functionality, easy to use - Offsite backup replication (with WAN acceleration), granular restore options for individual files and Exchange items, automated backup verification, and more!
  • Flexibility without the complexities – Simply drag and drop selected VMs to your chosen backup schedules and retention policies
  • Central management – a single pane of glass to manage all your Hyper-V and VMware backups from anywhere.

 

 

Best storage savings in the industry

 

Best deduplication in the industry - Augmented Inline Deduplication

 

Altaro VM Backup with Augmented Inline Deduplication drastically reduces your storage requirements for your backup repository. When compared to other vendors, it is the best deduplication in the industry creating the smallest backup size. Our deduplication runs across all backup jobs, you don’t need to group virtual machines together (no use of post processing). Requiring the least amount of backup space is only one of the benefits;Augmented Inline Deduplication also improves backup and restore speed.

 

  • Much lower storage requirements. When compared to other vendors Altaro creates the smallest backup size!
  • Faster backup and restore speed (less data to transfer)
  • Savings on storage requirements continue to improve as more VM backups are added
  • Augmented Inline Deduplication doesn’t tax server performance
  • Best deduplication in the industry not only for creating the smallest backup size but uses Variable Block Size for best efficiency.

 

 

FEATURES:

Augmented Inline Deduplication

 

Reduce backup storage requirements, and significantly speed up backups and restores.

Offsite backup

 

Replicate backups to an offsite location boosted with WAN acceleration or alternatively to a local network (LAN) path or set of rotated disks.

Boot VM

 

Instantly boot any VM version from the backup location and continue to restore data in the background.

Back up live VMs

 

Back up Hyper-V & VMware VMs with zero downtime by leveraging Microsoft VSS.

vCenter & CSV Support

 

Fully supports Cluster Shared Volumes (CSV) and VMware vCenter.

Fast Compression Algorithms

 

Leverage processors’ multithreading to boost up backup speed and reduce CPU requirements.

File & Exchange Item-Level Restore

 

Restore Individual Files or Exchange Items instantly from VM backups.

Automated test drills

 

Set an automated schedule to test the integrity of your backups for peace of mind

Flexible backup destinations

 

Multiple backup destinations for local backups and offsite copies.

Remote & Central console

 

Easily control, configure and monitor jobs for all your Hyper-V and VMware hosts, through a single console.

Flexible scheduling & queue

 

Schedule backups using grouped backup schedules or individual VMs.

RESOURCES

 

10 Essential Best practices for Virtual Server Backups by Brien M. Posey

 

Brien Posey outlines some of the fundamental best practices to consider when building your strategy for virtual server backups.

 

 

 

 

 

 

Altaro VM Backup Datasheet

 

 

 

 

DOWNLOAD

DOWNLOAD

Software Vulnerability Management

The Foundation to Reduce the Risk of Security Incidents Effectively

 

 

Vulnerability Management is a Prerequisite for Security

Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

 

It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

 

Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

 

 

Vulnerability Intelligence is the Foundation For Good Vulnerability Management

To successfully manage the software vulnerabilities in your environment you need to know all about them. We identified the urgency of this issue early on. Back in 2002, Secunia Research started investigating, coordinating disclosure and verifying software vulnerabilities. Today our in-house software vulnerability research remains the core of the Software Vulnerability Management products at Flexera Software.

 

Secunia Research is renowned for its accuracy, and is the guarantor that the information our customers receive through our solutions is much more than just information. It is verified intelligence, which has been scrutinized and rated before being submitted to our users in alerts customized to their environment and requirements. Our skilled and dedicated researchers work diligently to uncover and coordinate the disclosure of software vulnerabilities, and also to verify any software vulnerability reported by other sources. Secunia Research collects information from public disclosure lists and has custom-built robots crawl the internet for breaking news and rumors about new disclosures.

 

The result of this work is our Vulnerability Database, an unmatched catalog of over 50,000 applications which dates back to 2003. Our vulnerability research and our proprietary database are the foundation of our Software Vulnerability Management product portfolio which is developed to support the entire Software Vulnerability Management lifecycle.

 

 

Software Vulnerability Management Lifecycle

The Software Vulnerability Management lifecycle consists of three basic steps: Assess, Mitigate and Verify. In order to complete those steps a number of activities must be performed, supported by processes and technologies.

CSI DATASHEET

Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

 

Corporate Software Inspector includes an authenticated internal software inventory scanner. It can assess the security patch status of more than 20,000 programs running on Windows, Apple Mac OSX and Red Hat Enterprise Linux (RHEL) platforms. Corporate Software Inspector delivers software patching, configuration tools and hundreds of pre-configured patches for non-Microsoft applications running on Windows platforms.

 

The seamless integration with Microsoft System Center and Windows Server Update Services for security patch management means you maximise your investment and manage the patching of non-Microsoft products easily from within Microsoft System Center, using your existing infrastructure.

 

Features:

 

  •     Microsoft System Center Configuration Manager Integration
  •     Extensive Program Coverage
  •     Smart Groups
  •     Authenticated Scanning
  •     Corporate Software Inspector Package System (SPS)
  •     Scans Apple Mac OSX and RHEL
  •     Live Update
  •     User Management

 

 

 

 

 

Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

 

The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

 

Features:

 

  •     Verified Intelligence
  •     Flexera Advisories
  •     Extensive Coverage
  •     Automate List of Applications to Monitor for Advisories
  •     Service Now and BMC Remedy Ticketing
  •     Comprehensive Management Features
  •     Effective Prioritisation of Mitigation Efforts

 

 

 

 

 

 

 

 

 

 

Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

 

Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.

 

Features:

 

  •     Automatic Update of Programs
  •     Available in 8 Languages
  •     Covers Programs from Thousands of Vendors
  •     Comprehensive Management Features
  •     Reports Security Status for Each Program
  •     Detects End-of-life Programs

 

VIM DATASHEET

Quote Request

Submitting Form...

Form submission unsuccessful.

Form received.

A  1 0 0 0   B U S I N E S S   C H A L L E N G E S ?

Your clients IT security doesn't have to be one of them.

Sales

Our readily available account managers will assist with any sales queries, product or services quotes. We believe in long term sustainable relationships that enables business continuity and growth.

What we can assist with

Quotations

We can assist with quotations on any of our products or services.

Training

We can assist with booking training for your client for the relevant product sets.

POCs

 We can schedule a proof of concept for any of our related product sets.

Sign up to become a partner

Submitting Form...

Form submission unsuccessful.

Form received.

'Two heads are always better than one.'

 

Send through your request and we will contact you with the relevant information needed to complete your registration.

Services

Deployment

 

Let us get things up and running

 

This service is a supported service, which constitutes that a Netxactics engineer will support your technical team in deploying the product across your organisation.

Maintenance

 

We'll keep an eye on things

 

Through scheduled health checks and reporting, the Maintenance Service removes the burden of routine maintenance and enables you to focus on more pressing projects.

Workshops

 

Let us train you and certify you

 

These workshops are intended to provide a proper understanding of the platform to enable effective administration, deployment and maintenance of the solution.

Reporting

 

Need visibility? No problem

 

Detailed reporting provides an accurate health status on the solution deployed in your network..

On-site Call Out

 

Call us, we’ll be there to assist on-site

 

Netxactics On-site Support is a prepaid service, where hourly bundles of 10, 20 or 30 hours can be purchased upfront. Alternatively, we can arrange a billed-per-hour on-site support.

Telephonic & Email Support

 

Need assistance?

Give us a shout, we’d love to help

 

Netxactics Premium Telephonic & Email Support offers experienced technical support for the operation of the Netxactics product offerings.

Remote Support

 

Need help, no matter where you are we can log in and assist

 

Netxactics Remote Support offers a flexible and effective way to gain access to experienced Netxactics Services engineers to assist you remotely with a solution, independent of geographical location.

Request a services quote

Submitting Form...

Form submission unsuccessful.

Form received.

Training

We offer training on the below products.

 

Please request training by completing the form. Dates and times will be communicated upon making a request.

 

 

All training sessions are hosted at the Netxactics offices.

Sophos UTM Training

Sophos EndUser Protection Training

Sophos SafeGuard Enterprise Training

Engineer Training

(Non-Certified)

 

UTM/XG Product

 

3 Days Training

 

Costing is available per

booking or request

 

Max 6 attendees allowed

EndUser Protection

Training

(Non-Certified)

 

EndUser Protection (SEC)

 

1 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Sophos SafeGuard

Enterprise

(Non-Certified)

 

SafeGuard Enterprise / Full Disk /  Native / Cloud / File & Folder / Data Exchange

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Rapid7 Training

InsightVM  Training

(Certified)

 

InsightVM (Nexpose)

 

2 Days Training

 

Costing is available per booking or request

 

Max 10 attendees allowed

 

Held at the NX Offices & Online

Metasploit Training

(Certified)

 

Metasploit

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

 

Held at the NX Offices & Online

Appspider Training

(Certified)

 

Appspider

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

InsightIDR Training

(Certified)

 

InsightIDR

 

2 Days Training

 

Costing is available per

booking or request

 

Max 10 attendees allowed

Submitting Form...

Form submission unsuccessful.

Form received.

Book a Training Session

Marketing

We offer marketing support to our partners through the creation of email campaigns, and marketing essentials for various applications.

What we can assist with

Email Campaigns

 

We can assist with the creation of an email campaign about any of our products in HTML format to use in a focused campaign to your clients.

Printed Media

 

Should you need an advert, data-sheet, diagram or any design related to one of our products, we can assist with a design for your specific application.

Online Application

 

You can download our marketing essentials that contain the needed logo's, product summaries and related collateral for use on your website or other Online applications.

Partner End User Events

 

We have the needed resources to assist in planning and executing an end user product-focused event. We can help plan it, create invites and execute on the day of the event.

Download Your Marketing Essentials

Need help with anything? Give us a shout

Submitting Form...

Form submission unsuccessful.

Form received.

Johannesburg Head Office

T +27 11 444 4000

F +27 11 444 7000

info@nx.co.za

 

Physical Address

164 Katherine Street

Pinmill Farm

Block F, Lower level

Sandton

2416

 

Cape Town Branch Office

T +27 21 526 0455

F +27 21 526 0311

info@nx.co.za

 

Physical Address

Foyer 3, Century Way,

Century City

Cape Town

7441

Port Elizabeth Branch Office

T +27 21 526 0455

F +27 21 526 0311

info@nx.co.za

 

 

 

 

 

NETWORK

XG Firewall

The Next Thing in next-gen:

 

Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

 

With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

 

 

SG UTM

The Ultimate Network Security Package

 

With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

 

The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

 

 

Secure Wi-Fi

Super secure super Wi-Fi

 

Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

 

 

Secure Web Gateway

Complete web protection.

 

The web is the number one source of threats, with 80% of them coming from legitimate, trusted sites. Sophos Web Gateway provides security, visibility, and control for all your desktop PCs, Macs, Chrome books, and mobile devices, regardless of how or where they access the web. And you get the simple, elegant management experience that is Sophos Central.

 

 

Secure Email Gateway

Simple protection for a complex problem

 

Sophos Email is a secure email gateway engineered to keep businesses safe from all email threats. It simply stops spam, phishing, malware and data loss and keeps your people productive. And if you want to consolidate protection it lets you control email security alongside endpoint, mobile, the web, and wireless protection from Sophos Central’s single interface.

 

 

 

XG FIREWALL DATASHEET

SG UTM DATASHEET

SECURE WI-FI DATASHEET

SECURE  WEB DATASHEET

SECURE  EMAIL DATASHEET

ENDUSER & SERVER

Endpoint Protection

Comprehensive security for users and data

 

Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

 

 

Intercept X

A completely new approach to endpoint security

 

Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection. Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

 

 

Mobile Control

Countless devices, one solution

 

Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

 

 

SafeGuard Encryption

Protecting your data, wherever it goes

 

Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

 

 

Server Protection

Security optimised for servers

 

Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

 

 

Phish Threat

Reduce your largest attack surface — your end users

 

A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

 

Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

 

 

Sophos Home

Free protection for home computers

 

Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

 

PHISH THREAT DATASHEET

SERVER PROTECTION DATASHEET

SAFEGUARD DATASHEET

MOBILE CONTROL DATASHEET

MOBILE SECURITY DATASHEET

INTERCEPT X DATASHEET

ENDPOINT PROTECTION DATASHEET

Rapid7 products make your data more productive, unlocking answers you can use to remediate vulnerabilities, detect breaches, enhance IT operations, and more. How? They collect operational data from across your entire ecosystem - logs, endpoints, everything - then apply real-time analytics powered by an unmatched understanding of attackers and IT operations. It’s a process that transforms your data into insight, prioritises it based on your business objectives, and helps coordinate workflow to resolve the problem.

 

 

insightVM

Live vulnerability management and endpoint analytics

 

The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

 

INISIGHTVM DATASHEET

Collect

Automatically collect, monitor, and analyze vulnerabilities on your network.

Prioritise

View real-time risks and leverage custom views tailored to your users.

Remediate

Provide IT with the data they need to fix quickly, then track progress in real-time.

metasploit

Penetration testing software to help you act like the attacker

 

Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

METASPLOIT DATASHEET

Uncover Weaknesses

Find your vulnerabilities with

automated penetration tests powered by the world’s largest

exploit database.

Maximise Impact

Test and harden your people,

processes, and technology in

order of potential impact on

risk reduction.

Remediate Faster

Test your security program to

identify and more quickly fix

exposures.

appspider

Web application security testing to close the gaps in your apps

 

SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

 

The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

 

APPSPIDER DATASHEET

Keep Pace

Collect the info needed to test today’s ever-evolving apps.

Reduce Risk

Reduce risk with every build and remediate earlier in the SDLC.

Play Nice

Hand deliver the right insight the right way to DevOps.

insightIDR

Transform your data into actionable insight

 

Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.

Prioritise Your Search

Uncover insight that is hidden in user activity, logs, and endpoints,

to make investigations

20x faster.

Unify SIEM, UBA, and EDR

Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

Detect Attacks Earlier

Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

INSIGHTIDR DATASHEET

insightOPS

Your operations centre for endpoint visibility and infrastructure analytics.

 

InsightOps combines live endpoint visibility with log analytics, creating one console for total infrastructure awareness.

INSIGHTOPS DATASHEET

Centralize Your Data

Easily centralize data from across your infrastructure in one secure location.

Search and Ask

Search logs and ask questions of your endpoints for immediate results.

Find Answers

Find answers with relevant context that enables you to solve problems fast.

Logentries

Centralized Logging. Simple and Free.

Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

Collect & Centralize

Stream logs from all environments into Logentries’ centralized log server in real-time.

 

 

Search & Analyze

Search using basic keywords or our advanced query language for deeper analysis.

 

 

Visualize & Report

Build charts, graphs and alerts to monitor performance, user behavior and more.

 

DOWNLOAD FREE TRIAL

THE BREACH STOPS HERE

 

Secure access to infrastructure and apps for privileged and end users in the boundaryless hybrid enterprise through the power of identity services.

 

NEXT DIMENSION SECURITY REDUCES RISK BY 50%

 

Centrify redefines security from a legacy static perimeter based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise.

APPLICATION SERVICES

Stop Breaches That Target Apps

 

Centrify Application Services improves end user productivity and secures every user’s access to apps through single sign-on, multi-factor authentication and mobility management. Application Services supports internal users (employees, contractors) and external users (partners, customers).

 

Cloud and mobile apps are quickly forcing their way into the enterprise, facilitating employee productivity, but exposing business-critical data. Cloud apps, and the mobile devices that can access app data, are often outside of IT control.

 

Product Features

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ENDPOINT SERVICES

Stop Breaches That Start on Endpoints

 

Grant access to apps and infrastructure only from trusted and secured endpoints. Manage and secure your heterogeneous endpoints through a single source of identity and a least privilege access model.

 

Product Features

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

INFRASTRUCTURE SERVICES

Stop Breaches That Abuse Privilege

 

Minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.

 

IT organizations are increasingly deploying and managing hybrid environments that combine cloud-based and data center infrastructure, while working to mitigate the risk of insider and cyber threats and meet PCI DSS, SOX or other industry mandates and government regulations. Hybrid enterprises require a purpose-built, privileged access security solution that enables centralized control and visibility over privileged access and simplified compliance to protect against the evolving threat landscape.

 

Product Features

Device Management

Unified endpoint management that ensures app and resource access is tied to security posture.

 

Application Management

Provide an enterprise app store for access to approved apps with no need for admin privileges.

 

Adaptive MFA for Endpoints

Secure access to endpoints and privileged execution with MFA that adapts to your requirements.

 

Smart Card and Derived Credentials

Authenticate via smart cards for workstation and mobile devices.

Single Sign-on

Protect cloud and mobile applications.

 

Workflow & Lifecycle Management

Minimize attack surface and risk of cloud accounts.

 

Adaptive MFA for App Access

Leverage your users’ mobile devices as a second factor for app authentication

 

Mobility Management

Minimize application threats and improve mobile productivity.

 

App Gateway

Eliminate VPN risk with encrypted, dedicated, per-app access.

 

APPLICATION SERVICES

ENDPOINT SERVICES

INFRASTRUCTURE SERVICES

Identity Broker

Consolidate identities and leverage enterprise authentication service.

Adaptive MFA for Privileged Access

Reinforce secure access to critical systems and privileged accounts.

 

Privilege Elevation

Grant just enough privilege across Windows and Linux systems.

 

Shared Password Management

Reduce the risk of security breach when sharing privileged accounts.

 

Privileged Access Request

Govern access to privileged roles and accounts with approval workflows.

 

Secure Remote Access

Establish privileged sessions to targeted infrastructure without a VPN.

 

Session Recording & Monitoring

Monitor and record privileged sessions and changes to critical files.

 

Auditing and Reporting

Enforce accountability across all privileged activity and prove compliance.

IDENTITY IS AT THE TOP VECTOR OF ATTACK

It’s Time to Rethink Security

 

For years, we’ve relied on a well-defined boundary to protect our assets. We knew where the perimeters of our networks and endpoints were, and kept our important assets on the safe side. But things are changing — the world as we know it is an increasingly complex digital canvas of identities, that live in and out of the enterprise changing the perimeter of the network — to no perimeter at all.

 

81%

80%

Breaches involve weak, default or stolen passwords (Verizon)

Breaches involve privileged credential misuse (Forrester)

Virtual Machine Backup for Hyper-V and VMware

Choose a high performance Virtual Backup solution built for small and mid-market businesses

 

Built specifically for small and mid-market businesses

Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

 

Efficient backup setup

Up and running quickly, without the need for complex configurations!

 

With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

 

Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

 

  • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
  • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
  • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

 

 

Full control of your backups

Powerful and fast centralised full control & scalability

 

Managing and configuring backup/restore jobs across multiple hosts has never been simpler.

 

  • Powerful functionality, easy to use - Offsite backup replication (with WAN acceleration), granular restore options for individual files and Exchange items, automated backup verification, and more!
  • Flexibility without the complexities – Simply drag and drop selected VMs to your chosen backup schedules and retention policies
  • Central management – a single pane of glass to manage all your Hyper-V and VMware backups from anywhere.

 

 

Best storage savings in the industry

 

Best deduplication in the industry - Augmented Inline Deduplication

 

Altaro VM Backup with Augmented Inline Deduplication drastically reduces your storage requirements for your backup repository. When compared to other vendors, it is the best deduplication in the industry creating the smallest backup size. Our deduplication runs across all backup jobs, you don’t need to group virtual machines together (no use of post processing). Requiring the least amount of backup space is only one of the benefits;Augmented Inline Deduplication also improves backup and restore speed.

 

  • Much lower storage requirements. When compared to other vendors Altaro creates the smallest backup size!
  • Faster backup and restore speed (less data to transfer)
  • Savings on storage requirements continue to improve as more VM backups are added
  • Augmented Inline Deduplication doesn’t tax server performance
  • Best deduplication in the industry not only for creating the smallest backup size but uses Variable Block Size for best efficiency.

 

 

FEATURES:

Augmented Inline Deduplication

 

Reduce backup storage requirements, and significantly speed up backups and restores.

Offsite backup

 

Replicate backups to an offsite location boosted with WAN acceleration or alternatively to a local network (LAN) path or set of rotated disks.

Boot VM

 

Instantly boot any VM version from the backup location and continue to restore data in the background.

Back up live VMs

 

Back up Hyper-V & VMware VMs with zero downtime by leveraging Microsoft VSS.

vCenter & CSV Support

 

Fully supports Cluster Shared Volumes (CSV) and VMware vCenter.

Fast Compression Algorithms

 

Leverage processors’ multithreading to boost up backup speed and reduce CPU requirements.

File & Exchange Item-Level Restore

 

Restore Individual Files or Exchange Items instantly from VM backups.

Automated test drills

 

Set an automated schedule to test the integrity of your backups for peace of mind

Flexible backup destinations

 

Multiple backup destinations for local backups and offsite copies.

Flexible scheduling & queue

 

Schedule backups using grouped backup schedules or individual VMs.

Remote & Central console

 

Easily control, configure and monitor jobs for all your Hyper-V and VMware hosts, through a single console.

RESOURCES

 

10 Essential Best practices for Virtual Server Backups by Brien M. Posey

 

Brien Posey outlines some of the fundamental best practices to consider when building your strategy for virtual server backups.

 

 

 

 

 

Altaro VM Backup Datasheet

 

 

 

 

DOWNLOAD

DOWNLOAD

Software Vulnerability Management

The Foundation to Reduce the Risk of Security Incidents Effectively

 

 

Vulnerability Management is a Prerequisite for Security

Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

 

It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

 

Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

 

 

Vulnerability Intelligence is the Foundation For Good Vulnerability Management

To successfully manage the software vulnerabilities in your environment you need to know all about them. We identified the urgency of this issue early on. Back in 2002, Secunia Research started investigating, coordinating disclosure and verifying software vulnerabilities. Today our in-house software vulnerability research remains the core of the Software Vulnerability Management products at Flexera Software.

 

Secunia Research is renowned for its accuracy, and is the guarantor that the information our customers receive through our solutions is much more than just information. It is verified intelligence, which has been scrutinized and rated before being submitted to our users in alerts customized to their environment and requirements. Our skilled and dedicated researchers work diligently to uncover and coordinate the disclosure of software vulnerabilities, and also to verify any software vulnerability reported by other sources. Secunia Research collects information from public disclosure lists and has custom-built robots crawl the internet for breaking news and rumors about new disclosures.

 

The result of this work is our Vulnerability Database, an unmatched catalog of over 50,000 applications which dates back to 2003. Our vulnerability research and our proprietary database are the foundation of our Software Vulnerability Management product portfolio which is developed to support the entire Software Vulnerability Management lifecycle.

 

 

Software Vulnerability Management Lifecycle

The Software Vulnerability Management lifecycle consists of three basic steps: Assess, Mitigate and Verify. In order to complete those steps a number of activities must be performed, supported by processes and technologies

Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

 

Corporate Software Inspector includes an authenticated internal software inventory scanner. It can assess the security patch status of more than 20,000 programs running on Windows, Apple Mac OSX and Red Hat Enterprise Linux (RHEL) platforms. Corporate Software Inspector delivers software patching, configuration tools and hundreds of pre-configured patches for non-Microsoft applications running on Windows platforms.

 

The seamless integration with Microsoft System Center and Windows Server Update Services for security patch management means you maximise your investment and manage the patching of non-Microsoft products easily from within Microsoft System Center, using your existing infrastructure.

 

Features:

 

  •     Microsoft System Center Configuration Manager Integration
  •     Extensive Program Coverage
  •     Smart Groups
  •     Authenticated Scanning
  •     Corporate Software Inspector Package System (SPS)
  •     Scans Apple Mac OSX and RHEL
  •     Live Update
  •     User Management

CSI DATASHEET

Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

 

The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

 

Features:

 

  •     Verified Intelligence
  •     Flexera Advisories
  •     Extensive Coverage
  •     Automate List of Applications to Monitor for Advisories
  •     Service Now and BMC Remedy Ticketing
  •     Comprehensive Management Features
  •     Effective Prioritisation of Mitigation Efforts

 

 

 

 

 

 

Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

 

Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.

 

Features:

 

  •     Automatic Update of Programs
  •     Available in 8 Languages
  •     Covers Programs from Thousands of Vendors
  •     Comprehensive Management Features
  •     Reports Security Status for Each Program
  •     Detects End-of-life Programs

 

VIM DATASHEET

  • Sophos

    NETWORK

     

    XG Firewall

    The Next Thing in next-gen:

     

    Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed to the way they report information and how they work with other security systems around them, giving you an unprecedented level of simplicity, insight, and advanced threat protection.

     

    With an interface designed to eliminate unnecessary complexity, it enables you to use the powerful features without needing to become an IT security expert.

     

    SG UTM

    The Ultimate Network Security Package

     

    With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to provide optimal performance, versatility, and efficiency to meet all your security needs.

     

     The Sophos SG Series appliances are designed to provide the optimal balance between performance and protection – for diverse IT environments. Whether you need a solution for a small remote office, want to protect your school campus, or are a global organisation requiring high-availability and enterprise-grade features, our SG Series appliances are an ideal fit.

     

     

    Secure Wi-Fi

    Super secure super Wi-Fi

     

    Sophos Wireless provides a simple, effective way to manage and secure your wireless networks. Managed from Sophos Central, it is easy to deploy as a standalone product or as part of your portfolio of cloud-managed solutions.

     

    Secure Web Gateway

    Complete web protection.

     

    Sophos Web Gateway

    • Reliable, globally-deployed cloud infrastructure
    • Enterprise-grade Secure Web Gateway that’s advanced yet easy to use
    • Manage all your Sophos Central security from one unified console
    • Fast Lane technology that can speed up web browsing

     

    Secure Email Gateway

    Simple protection for a complex problem

     

    Sophos Email

    • Fast setup and easy integration
    • Proven anti-virus, anti-Spam, and anti-phishing
    • Email continuity with an end-user, self-service portal; spooling; and emergency inbox
    • Reliable, global Sophos-hosted infrastructure
    • Manage alongside endpoint, the web, and wireless in Sophos Central’s unified console

     

     

     

    ENDUSER & SERVER

     

    Endpoint Protection

    Comprehensive security for users and data

     

    Sophos Endpoint Protection makes it simple to secure your Windows, Mac and Linux systems against malware and advanced threats, such as targeted attacks. Our next-generation endpoint protection integrates innovative technology like malicious traffic detection with real-time threat intelligence from SophosLabs to help you prevent, detect and remediate threats with ease. We also add web filtering, application control, device control and more right into the lightweight endpoint agent, so your organisation’s policies are enforced anywhere your users go.

     

     

    Intercept X

    A completely new approach to endpoint security

     

     Sophos Intercept X adds next-generation signature-less technologies on top of your current endpoint security to give you complete, layered protection.

     

    Sophos Intercept X uses multiple layers of technology, allowing you to create your own tailored next-generation endpoint security solution.

     

     

    Mobile Control

    Countless devices, one solution

     

     Your users are accessing corporate data on their personal mobile devices more and more. However, this creates management and security challenges. Sophos Mobile Control allows you to keep your users productive while securing all of those different mobile devices with minimal IT effort.

     

     

    SafeGuard Encryption

    Protecting your data, wherever it goes

     

    Sophos SafeGuard encrypts content as soon as it is created. The encryption is always on, allowing for seamless and secure collaboration. Synchronised Encryption proactively protects your data by continuously validating the user, application, and security integrity of a device before allowing access to encrypted data. This method of always-on protection goes everywhere your data goes, making it the most comprehensive data security solution on the market.

     

     

    Server Protection

    Security optimised for servers

     

    Sophos Server Protection protects your server environment from malicious attacks while keeping your servers running at optimum performance. Designed to secure business critical servers, Sophos Server Protection includes server application white-listing, advanced anti-malware, and behaviour analysis. It’s server security made simple, providing protection for your Windows, Linux, and UNIX systems, and optimised for virtual environments.

     

     

    Phish Threat

    Reduce your largest attack surface — your end users

     

    A solid security awareness program is an integral part of any defense-in-depth strategy. Sophos Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.

     

    Phish Threat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture.

     

     

    Sophos Home

    Free protection for home computers

     

    Sophos Home protects every Mac and PC in your home from malware, viruses, ransomware, and inappropriate websites. It uses the same award-winning technology that IT professionals trust to protect their businesses. Best of all, you can manage security settings for the whole family from any browser.

     

     

  • Rapid7

    insightVM

    Live vulnerability management and endpoint analytics

     

     The modern network is no longer comprised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. Utilizing the power of Rapid7’s Insight Platform and the heritage of our award-winning Nexpose solution, InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

     

    metasploit

    Penetration testing software to help you act like the attacker

     

    Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilising an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.

     

    appspider

    Web application security testing to close the gaps in your apps

    SPAs, APIs, mobile—the evolution of application technology is measured in months, not years. Is your web application security testing tool designed to keep up? AppSpider lets you collect all the information needed to test all the apps so that you aren’t left with gaping application risks.

     

    The dynamic application security testing (DAST) solution crawls to the deepest, darkest corners of even the most modern and complex apps to effectively test for risk and get you the insight you need to remediate faster. With AppSpider on your side (or, rather, all of your sides), you’ll be able to scan all the apps today and always be ready for whatever comes next.

     

    insightOps

    Your operations centre for endpoint visibility and infrastructure analytics.

     

    InsightOps combines live endpoint visibility with log analytics, creating one console for total infrastructure awareness.

     

    Logentries

    Centralized Logging. Simple and Free.

    Logentries’ centralized logging service takes only minutes to setup and is free to use. Centralize logs from multiple sources and search using a simple query builder.

     

  • Altaro

    Virtual Machine Backup for Hyper-V and VMware

    Choose a high performance Virtual Backup solution built for small and mid-market businesses

     

     

    Built specifically for small and mid-market businesses

    Altaro VM Backup is a fast, affordable, high performance backup solution, specially developed for small and mid-market businesses. We’ve cut the waste and hassle to give you an agile, streamlined solution that is easy to implement, feature-rich, with outstanding support as part of the package.

     

     

    Efficient backup setup

    Up and running quickly, without the need for complex configurations!

     

    With Altaro VM Backup, you can install and run your first virtual machine (VM) backup in less than 15 minutes. Get up and running quickly, without the need for complex configurations or software dependencies.

     

    Altaro VM Backup is designed to give you the power you need, without the hassle and steep learning curve.

     

    • Easy to use, intuitive UI - making it easy to implement a rock solid backup strategy
    • Managing and configuring backup/restore jobs across multiple hosts has never been simpler
    • Full control & scalability – Monitor and manage all your Hyper-V and VMware hosts from a single console

     

     

  • Centrify

    APPLICATION SERVICES

    Stop Breaches That Target Apps

     

    Centrify Application Services improves end user productivity and secures every user’s access to apps through single sign-on, multi-factor authentication and mobility management. Application Services supports internal users (employees, contractors) and external users (partners, customers).

     

    Product Features

    Single Sign-on

    Protect cloud and mobile applications.

     

    Workflow & Lifecycle Management

    Minimize attack surface and risk of cloud accounts.

     

    Adaptive MFA for App Access

    Leverage your users’ mobile devices as a second factor for app authentication

     

    Mobility Management

    Minimize application threats and improve mobile productivity.

     

    App Gateway

    Eliminate VPN risk with encrypted, dedicated, per-app access.

     

     

     

    ENDPOINT SERVICES

    Stop Breaches That Start on Endpoints

     

    Grant access to apps and infrastructure only from trusted and secured endpoints. Manage and secure your heterogeneous endpoints through a single source of identity and a least privilege access model.

     

    Product Features

    Device Management

    Unified endpoint management that ensures app and resource access is tied to security posture.

     

    Application Management

    Provide an enterprise app store for access to approved apps with no need for admin privileges.

     

    Adaptive MFA for Endpoints

    Secure access to endpoints and privileged execution with MFA that adapts to your requirements.

     

    Smart Card and Derived Credentials

    Authenticate via smart cards for workstation and mobile devices.

     

     

     

    INFRASTRUCTURE SERVICES

    Stop Breaches That Abuse Privilege

     

    Minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.

     

    Identity Broker

    Consolidate identities and leverage enterprise authentication service.

     

    Adaptive MFA for Privileged Access

    Reinforce secure access to critical systems and privileged accounts.

     

    Privilege Elevation

    Grant just enough privilege across Windows and Linux systems.

     

    Shared Password Management

    Reduce the risk of security breach when sharing privileged accounts.

     

    Privileged Access Request

    Govern access to privileged roles and accounts with approval workflows.

     

    Secure Remote Access

    Establish privileged sessions to targeted infrastructure without a VPN.

     

    Session Recording & Monitoring

    Monitor and record privileged sessions and changes to critical files.

     

    Auditing and Reporting

    Enforce accountability across all privileged activity and prove compliance.

  • Flexera

    Software Vulnerability Management

    The Foundation to Reduce the Risk of Security Incidents Effectively

     

    Vulnerability Management is a Prerequisite for Security

    Software Vulnerability Management is a challenge for organizations of all sizes. It is an expansive discipline that cannot be addressed by technology alone, but must include policies, processes and technology.

     

    It is quite common that policies are not aligned with business needs, that processes are not integrated and that technologies are not implemented to their full capabilities. The result of the misalignment is that, despite security investments, we continue to see organizations being breached and suffering significant losses as a consequence of the exploitation of known software vulnerabilities.

     

    Flexera Software’s acclaimed Software Vulnerability Management solutions address these challenges, protecting companies and computers around the world.

     

     

    Corporate Software Inspector

    Corporate Software Inspector gives you the when, where, what and how of security patching. It tells you when a software vulnerability with an available patch is threatening your infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

     

     

    Vulnerability Intelligence Manager

    Vulnerability Intelligence Manager leverages the intelligence from Flexera Research as the foundational layer to enable security and operations’ professionals to prioritise their work.

     

    The combination of broad coverage, vulnerability intelligence provided by Flexera Research and management features makes it possible for organisations to assess risk based on the relative criticality of vulnerabilities in their own environment, driving the effective use of resources to prioritise mitigation actions with highest impact to reduce the attack surface for cyber criminals and hackers.

     

     

    Personal Software Inspector

    Personal Software Inspector is a security scanner which identifies programs that are insecure and need updates. It automates the updating of the majority of these programs, making it a lot easier to maintain a secure PC. It automatically detects insecure programs, downloads the required patches, and installs them accordingly without further user interaction.

     

    Personal Software Inspector also detects and notifies you of programs that cannot be automatically updated with software patches and provides you with detailed instructions for updating the program when available. In most cases, you simply need to click the appropriate icon in the Results window and follow the on-screen instructions to install the latest patches.