24
2016 Specialized VAD distributor Network Monitoring IT Security Storage Virtualization

SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

2016

Specialized VAD distributorNetwork Monitoring

IT SecurityStorage Virtualization

Page 2: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

02 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

Bakotech Ltd.Distributor of innovative solutions in the field of security, network and IT infrastructure.

Bakotech Ltd., based in Kraków, was founded in 2013 and is a part of BAKOTECH international distribution group. As a specialized IT distributor in the field of security, network and IT infrastructure, Bakotech focuses on delivering the high quality distribution services in Central Eastern Europe, particularly in Poland, Hungary, Romania, Bulgaria, Slovenia, Croatia and the Baltic. Bakotech Ltd. sells products and services exclusively through the channel, by well-developed partner network – resellers, integrators and ISPs.

SECURITY SOLUTIONS:TitanHQ – Mail Security and Web Filtering solutions pg 4-5Webroot – Antimalware, Antivirus, Endpoint Protection and Mobile Security pg 6CoSoSys – Data Loss Prevention and Mobile Device Management solutions pg 7gateprotect – Next Generation Firewalls and UTM solutions pg 8AlienVault - Unified Security Management & Threat Intelligence pg 9ObserveIT – Insider Threat Management Software pg 10Resilience – IT security platforms - firewalls, UTM and gateways pg 11Celestix – Strong authentication, secure remote access and perimeter security pg 12Wheel Systems – Monitoring, recording and auditing remote sessions pg 13

NETWORK SOLUTIONS:NETSCOUT – Unified Service Delivery Management solutions focused on assuring service delivery for the world’s most demanding and complex service delivery environments pg 16Fluke Networks - Application performance management across LAN, WAN and wireless networks pg 17Elfiq Networks - Link load balancing appliances for business continuity, Internet and WAN redundancy pg 18Netwrix – auditing platform for entire IT infrastructure pg 19SolarWinds – advanced network management systems pg 20Axence – comprehensive management of computer networks pg 21

Page 3: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

03 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

SECURITYSOLUTIONS

Page 4: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

04 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

wwww.bakotech.pl · cee.bakotech.com

04

Niezawodna ochrona serwerów pocztowych

System antyspamowy SpamTitan efektywnie filtruje wiadomości, umożliwiając zwiększenie efektywności biz-

nesowej i zapewniając odpowiedni poziom bezpieczeństwa, a jednocześnie pozwalając na łatwą

i intuicyjną instalację rozwiązania. SpamTitan pozwala na filtrowanie ruchu wychodzącego oraz

przychodzącego i ochronę zasobów firmowych przedsiębiorstw przed wzrastającą liczbą wirusów

i malware’ów. Za pomocą rozwiązania SpamTitan przedsiębiorstwa mogą prowadzić ciągłe monitorowanie

wydajności serwerów mailowych, prowadzić statystyki ilości otrzymywanych wirusów lub wiadomości typu

spam dla konkretnych odbiorców lub ich grup. SpamTitan jako niezwykle intuicyjne i wydajne rozwiązanie jest

wysoko ceniony przez działy IT w przedsiębiorstwach, a poprzez swoją efektywność kosztową popartą

w statystykach, stanowi uzasadnienie dla zarządów na wydatki związane z jego zakupem.

SpamTitan – korzyści związane z ochroną poczty:

· Najlepsza z możliwych technologia blokowania niechcianych wiadomości e-mail

· Ekstremalnie niski poziom tzw. false positives

· Redukcja ruchu w sieci i obciążenia serwerów pocztowych poprzez możliwość wyodrębnienia spamu

do kwarantanny zanim pojawi się on w sieci firmowej

· Zdecydowana redukcja czasu jaki użytkownicy poświęcają na zarządzanie spamem na urządzeniach

końcowych

· Efektywne wsparcie ze strony producenta i dystrybutora

Nowoczesna brama sieciowa do filtrowania ruchu sieciowego i zapewniania bezpieczeństwa dostarczanych treści

Rozwiązanie WebTitan to niezawodna i natychmiastowa ochrona dla każdego użytkownika w sieci.

Rozwiązanie umożliwia całkowicie bezpieczne przeglądanie stron www oraz doskonałą ochronę

antywirusową i kontrolę treści.

WebTitan zapewnia bezpieczeństwo każdego użytkownika w sieci:

· Filtrowanie adresów URL – niezrównana kombinacja zasięgu, dokładności i elastyczności

· Kategoryzacja w czasie rzeczywistym dla ponad 500 mln stron www w 200 językach;

100% zgodności z rankingiem Alexa dla 1 miliona najczęściej odwiedzanych stron www

· Kontrola treści umożliwiająca min. blokowanie niechcianych słów kluczowych i szkodliwych

załączników

· Podwójna antywirusowa ochrona: nagrodzone silniki antywirusowe Kaspersky LABs i Clam Antivirus

DARMOWY TRIAL - PRZETESTUJ

Mail Security solution - the ultimate antispam protection for your e-mail serversSpamTitan is a complete solution to email security of fering protection from Spam, Viruses, Trojans, Phishing and unwanted content. This ef fective anti-spam solution can be implemented as an ISO version on physical server, on vir tual machine or also as a cloud.Intuitive and easy to manage, always highly appreciated by IT departments who need to work fast and ef f iciently. Ideal spam blocker for whole range of organizations, educational institutions and Internet Service Providers.

KEY BENEFITS: the most comprehensive email protection platform against spam and e-mail threats effective multi layered anti-spam analyses resulting in 99,9% spam detection ultra-low false positive rate (less than 0,3%) inward and outward email scanning double antivirus protection, including Kaspersky Lab and Clam AV engines easy to install, simple to configure, up and running in minutes low maintenance overhead, fully automated updating and end user spam management multiple automated reports web interface

SEE MORE

[email protected]

Page 5: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

05 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016BAKOTECH 2016

Advanced web filtering solution dedicated for providing content security

WebTitan provides feature rich functionality to allow you manage and protect users from webmalwares and others threats when browsing the Internet.

KEY BENEFITS: includes proxy server and cache URL filtering – 53 categories plus additional customizable category creation implemented zveloCAT technology enables real-time categorization of over 6 billion web

pages in 200 languages; 100% coverage of the Alexa 1 million most visited websites granular policy engine based on users and groups application and content control with blocking unwanted keywords and file types included antivirus protection (Clam AV) three ways of implementation – ISO version, virtual appliances version and Cloud version LDAP and NTML integration additional features: https filtering, SSL inspection, YouTube for Schools, Save Search

SEE MORE

[email protected]

Page 6: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

06 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

FREE TRIAL

Uncompromising and reliable protection for Endpoint and Mobile!One of the worldwide leading endpoint security vendors. Being on the market since 1997, Webroot provides advanced endpoint security solutions to protect both: personal user information and corporate resources against wide variety of threats from Internet and internal networks. Along with a wide range of security products for home and office, Webroot protects corporate networks and allows its users safely use internet, company resources, online banking, e-stores, surf the internet and search for information without risking that the corporate resources will be exposed to any threat.

WHY WEBROOT?Webroot BrightCloud Threat Intelligence Services offer collective threat intelligence that is accurate, timely and contextual. Protect your workforce and company data with uncompromising internet security for desktops, laptops, virtual machines, tablets, smartphones, and web browsing.

unique, the most efficient solution to protect endpoints, mobile devices, servers and virtual systems based on hash analysis

no need for regular database updates no performance impact due to innovative approach relies on file identification

system, advanced behavioral analysis and world’s smallest endpoint security agent (<700 KB)

installation in under 20 seconds and initial scan in less than 5 minutes (typically 2 min.) simple, feature-rich web-based management console no conflicts with existing endpoint protection software available also as a SaaS solution

FOR HOME

AntiVirusProtects you against viruses, spyware,

phishing attacks & unknown online threats

Internet Security PlusAdditional protection for mobile devices plus

Password Manager module

CompleteComprehensive protection for up to 5 devices with additional System Cleaner function and

25 GB of Secure Online Storage

FOR BUSINESS

[email protected]

wwww.bakotech.pl · cee.bakotech.com

03

Uncompromising and reliable protection for Endpoint and Mobile!

Webroot, one of the worldwide leading endpoint security vendors. Being on the market since 1997, Webroot provides advanced endpoint security

solutions to protect both: personal user information and corporate resources against wide variety of threats from Internet and internal networks.

Webroot consistently develops products and services to protect individuals as well as corporate customers and regularly obtains key awards

related to security from global analyst fi rms having at the same time large number of satisfi ed users. Along with a wide range of security products

for home and offi ce, Webroot protects corporate networks and allows its users safely use internet, company resources, online banking, e-stores,

surf the internet and search for information without risking that the corporate resources will be exposed to any threat. Administrators should

be satisfi ed to use central management web based GUI with its easy to use implementation, policy enforcement, administration and reporting

capabilities.

Why Webroot?

· Unique, the most effi cient solution to protect endpoints, mobile devices, servers and virtual systems based on hash analysis

· No need of regular database updates

· No performance impact due to innovative approach relies on file identification system, advanced behavioral analysis and world’s smallest

endpoint security agent (<700 KB)

· Installation in under 20 seconds and initial scan in less than 5 minutes (typically 2 min.)

· Simple, feature-rich web-based management console

· Unique solution designed for virtual environment, prevent performance and security

· No Conflicts with existing endpoint protection software – no need of uninstall of anything to test it!

FREE TRIAL

11:5911:59

4G 11:59 AM 99%4G 11:59 AM

11:5911:59

SecureAnywhere Business Endpoint ProtectionInstantaneous protection for workstations, servers and

virtual desktop infrastructure

SecureAnywhere Business Mobile ProtectionEffi cient protection for mobile devices works with Apple

iOS™ and Android™ platforms

Secure Anywhere Business User ProtectionFlexible protection of multiple devices per user

Page 7: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

07 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

SEE MORE

Complete security in a simple appliance with powerful and rock solid foundation for your sensitive data.

CoSoSys is an award winning IT security vendor founded in 2004. It has offices in Germany, the United States, South Korea and Romania, with more than 70 distributors and resellers in over 30 countries. Its solutions are trusted by some of the biggest companies in the world and protecting data on more than 30 million devices. Mission is to prevent data loss and data theft to enable businesses and end users to enjoy the benefits of mobility, portability and communications solutions without compromising security.

ENDPOINT PROTECTOR 4Endpoint Protector is the flagship product for Data Loss Prevention and Mobile Device Management developed by CoSoSys. As a cross-platform tool, it provides Device Control and Content Aware Protection for Windows and Mac OS X computers, as well as allowing management of an iOS & Android mobile device fleet. Besides being extremely granular, it is also very easy to incorporate and deploy into any type of network, either as hardware or virtual appliance. Whether a small company or an enterprise, Endpoint Protector solves your DLP & MDM challenges. It is also complemented by EasyLock, providing enforce encryption for USB storage devices.

INCLUDED MODULES:

• Device Control• for Windows, Mac OS X and Linux• One of the most granular solution on the market

Take control of the devices connected to your network and ensure confidential data is not lost, leaked or stolen via USB flash drives, memory cards, external HDD, mp3 players, digital cameras, teensy board, etc

• Content Aware Protection • for Windows, Mac OS X and Linux• One of the most advanced Mac solution on the market

Support communication but protect sensitive data being sent, attached, shared or uploaded via e-mails, messengers, web browsers, cloud storage solutions, social media, etc.

• Mobile Device Management• for Androida, iOS and OS X• one of the most user-friendly solution on the market

Increase productivity, support mobility and expand your data loss prevention policy by managing your mobile device fleet.

Hardware Appliance Virtual Appliance

• Out-of-the-box solution

• Available models for networks in size

from 20 to 4000+ endpoints

• Compatible with Vmware, VirtualBox,

Parallels i Microsoft Hyper-V

• Implementation in less then one hour

• Formats: .ovf, .vmx, .vhd

[email protected]

Page 8: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

08 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

Complete security against cyberattacksgateprotect solutions effectively protect companies worldwide against cyber-attacks. The exten-sive Unified Threat Management solutions for medium-sized companies, the Next Generation Firewalls for highest security requirements in large companies and the Managed Security systems from gateprotect provide for reliable network security.

NEW GENERATION UTM DEVICES: GPO, GPA, GPX, GPZ SERIESTo meet the individual security requirements of small and medium-sized companies, an easy-to-usecomplete solution is the answer

innovative security and network features reliable protection against spam, viruses and mal-

ware security functions such as Single Sign-On, Traf-

fic Shaping, QoS, IPSec/SSL IDS/IPS, Webfilter and Virusfilter

NEXT GENERATION FIREWALL: NETWORK PROTECTORgateprotect-NP revolutionizes the concept of next-generation firewalls by using unique full valida-tion whitelisting to ensure maximum network se-curity. Every single network transaction is analyzed down to the application and content level. Only transmissions that are fully understood and validat-ed are allowed to pass. Everything else is blocked from entering or leaving the network, thus not only securing the network from outside attacks, but also providing highly effective data loss prevention.

eGUI TECHNOLOGYThe occurrence of new cyber-threats every day and the utiliza-tion of mobile devices are turning IT security into a more and more complex task. The innovative usability approach of our graphic user interface eGUI visualizes the network and assures reliable security at a competitive price.

COMPLETE SECURITY solution for all-round protection for network and endpoints innovative, easy-to-use complete solution combines the innovative security features of the gateprotect next generation firewall appliances

with effective endpoint protection perfect malware protection and data

security for all devices in real time – anywhere and at any time.

SEE MORE

[email protected]

Page 9: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

09 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

[email protected]

AlienVault delivers everything you need to detect, defend against & respond to today’s threats in minutes. In addition to all the functionality of a traditional SIEM, AlienVault USM also builds the essential security capabilities into a single platform with no additional feature charges. And Alien-Vault’s focus on ease of use and deployment makes it the perfect fit for mid-market enterprises and organizations with limited budget and few in-house resources.

AlienVault Unified Security Management™ (USM) is an all-in-one platform designed and priced to ensure that mid-market organizations can effectively defend themselves against today’s ad-vanced threats.

ALIENVAULT USM PROVIDES: Unified, Coordinated Security Monitoring Simple Security Event Management and Reporting Continuous Threat Intelligence Fast Deployment

Multiple Security Functions Without Multiple Consoles FIVE ESSENTIAL SECURITY CAPABILITIES:• Asset Discovery

• Active Network Scanning• Passive Network Monitoring• Asset Inventory

• Software Inventory

• Behavioral Monitoring• Netflow Analysis• Service Availability Monitoring• Full packet capture

• Vulnerability Assessment• Network Vulnerability Testing

• Continuous Vulnerability Monitoring

• SIEM• Log Management• Event Correlation• Incident Response• Reporting and Alarm

The AlienVault Unified Security Management™ (USM) platform gives you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.

SEE MORE

• Threat Detection• Network IDS• Host IDS• File Integrity Monitoring

(FIM)

Page 10: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

10 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

[email protected]

The World’s #1 Insider Threat Management SoftwareObserveIT is the leader in user behavior analytics for insider threat detection and enables companies to mitigate the risk of insider threats from business users, privileged users, and third-party contractors.

ObserveIT records, monitors, and analyses user behavior across the entire enterprise down to the application field level with zero operational impact. Analytics and scoring identify users who represent the greatest risk, enabling security teams to respond before the business is im-pacted. Our granular user activity metadata provide a detailed audit trail of all user behavior to streamline investigations and audits.

ObserveIT is trusted by over 1,200 customers in 70 countries across all verticals.

MAIN FEATURES: Field-Level App Monitoring

Capture all user activity in every application, web page and system, regardless of how users gain access (RDP, SSH, Telnet, Citrix, direct console login, etc.). Field-level application monitoring allows to understand risk at an application field-level and detect abnormal usage.

User Risk AnalysisDetect user actions that are out of role, suspicious, or in violation of security policies and automatically assign a risk score for every user with user behavior analytics. Quickly identify, investigate and respond to risky user activity, with our user risk dashboard.

Live Session ResponseStop the unwanted exposure of sensitive data, company IP, or customer information with live session response. Whether you learn of insider threats from ObserveIT or external threats from your SIEM, drill-down into user sessions, message the user and remotely shut down the session.

DOWIEDZ SIĘ WIĘCEJ

CLIENTS:• AIG• Allianz• BNP Paribas

• Coca-Cola• ING• Nissan• Siemens

• Starbucks• TELECOM• Toshiba• Xerox

Page 11: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

11 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

[email protected]

Leading manufacturer of security platformsResilience Technology Corporation is a leading developer and manufacturer of cyber security tools, engineering and purpose-built hardware for best-of-breed network security applica-tions. Founded in 1995 as a manufacturer of security appliances designed specifically to host Check Point firewall software, Resilience created leading high availability technology with superior redun-dancy.

Resilience serves a broad and loyal client base of major international telecoms, managed service providers and leaders in key vertical markets such as petroleum, public utilities, airlines, banking and pharmaceuticals.

WHY CHOOSE RESILLIENCE? iHA – integrated High Availability – patented proactive version of HA technology ResLINK – connects network security appliances and enables iHA across all system layers in

Check Point installations ResOS – full-featured, Linux-based operating system that further hardens the Check Point ker-

nel BrandX migration – BrandX eliminates the typical forklift upgrade and its associated cost and

staff resource concerns, allowing organizations to migrate from existing appliances or servers to Resilience appliances strategically over time Continuous Secured Ownership

24x7x365 support automation that minimizes human factor modern and extremely efficient system architecture less than 1% appliances shipped are RMA’d

SEE MORE

Page 12: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

12 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

PROVIDING STRONG AUTHENTICATION, SECURE REMOTE ACCESS AND PERIMETER SECURITY Celestix is a leading provider of strong authentication, secure remote access and perimeter security – enabling organizations to enforce strong security controls for both user and data centric security.

SOLUTIONS:• Celestix HOTPin – extremely safe, efficient tokenless two-factor authentication

Celestix HOTPin is a tokenless two-factor authentication solution that enables organi-zations to empower their mobile workforce while ensuring industry leading protection of digital identities and protecting against unsolicited access to corporate resources, a primary reason for the loss of data.

• The DAX DirectAccess appliance

With Celestix DirectAccess (DAX) users can experience the full corporate environment from any location through any internet connection. All assets from intranet websites to line-of-busi-ness applications are accessible for the user in less than one click, reducing connection pro-blems, productivity bottlenecks, and IT support cases. The DAX DirectAccess appliance provides a purpose built, reliable and preformat platform to ensure rapid deployment and easy management of the DirectAccess gateway, for compatible versions of Windows 7 and 8.

KEY BENEFITS: Extremely secure, effective and strong remote users authentication Fast access to corporate resources without using any VPN connection Reduction of maintenance and administration of remote access to internal resources Double factor authentication for better digital identification and control of unauthorized

access to corporate resource

SEE MORE

[email protected]

Page 13: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

13 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

FUDO can minimize the consequences related to granting external personnel access to your own IT infrastructure. The ability to track current connections, block unauthorized activities or manage access rights, allows to actively influence the securi-ty of the monitored IT system. In case there is a suspicion of undesired activities taking place, FUDO allows for finding questionable session and reviewing it second after second as a video stream. Being a self-sufficient solution FUDO doesn’t require installing agent applications on monitored servers, client software for recording connections or auditing programs. FUDO has its own, built-in storage and it’s managed through intuitive WEB GUI.

BUSINESS INTELLIGENCEEnables reviewing the work efficiency of hired consultants based on sessions’ productivity factor.

SESSION VIDEOSAll sessions can be replayed as a video, to see one command after another. Sessions are presented as seen by the actual user. All you need is a web browser.

WATCHING LIVE SESSIONSCurrent sessions can be viewed in form of an active video, without any lagging.

GRAPHICAL SESSIONS’ OCRAllows fast and precise analysis of RDP and VNC sessions thanks to content indexing and full-text search support.

COMMENTING AND TAGGING SESSIONSAllows indicating specific parts of the sessions that require attention of qualified personnel respon-sible for supervising connections.

REGISTERING USER LOGIN REASONOption to store login reason allows for more precise control over the access to remote systems.

COOPERATION WITH CONSULTANTIn case another user’s assistance is required, FUDO enables sessions’ sharing, allowing for addi-tional person to join current session from a web browser and work along with the user.

PRECISE SESSIONS RECREATIONEach session recorded on FUDO isn’t just a video stream. It is also meta-data, transferred files, keyboard and mouse registry, as well as network and user activity.

FAST REACTION TO THREATSIn case administrator notices suspicious and/or questionable activities, FUDO allows to temporarily block the given session, or to terminate the connection and revoke user’s access rights.

HIGHEST LEVEL OF SECURITYAll sessions are archived, time-stamped and en-crypted. FUDO implements full hardware components redundancy and supports advanced HA mode as well as external storage systems backups.

SEE MORE

[email protected]

Page 14: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

14 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

SECURITY SERVICES DISTRIBUTION IN A SaaS MODELCeesoft is a part of an international distribution group Bakotech. As a specialized distributor of IT security services in Central and Eastern Europe Ceesoft offers world-class antivirus and antispam solutions in the MSP subscription model.

SUBSCRIPTION MODELThe Managed Service Provider (MSP) model is a special partner program dedicated to companies providing services (Security as a Service). Each business partner, who will sign a partnership agreement with the distributor and purchase the first license can become a MSP Partner.

BENEFITS FOR PARTNERS: no activation costs no maintenance costs easy management - by Partner, Distributor or Customer management / configuration / reporting via the web console Pay as You Use - pays only for the active licenses no charge for unused licenses initial order - Webroot: 1 license, SpamTitan 10 e-mail accounts monthly payment the more active licenses / e-mail accounts, the lower the price per license / e-mail account

BENEFITS FOR CUSTOMERS: OPEX planning as opposed to the traditional CAPEX model improved cashflow low monthly subscription payments no additional costs of running the service flexible change at any time - no need to long-term purchase

SEE MORE

[email protected]

Page 15: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

15 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

NETWORKSOLUTIONS

Page 16: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

16 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

SEE MORE

Assuring service delivery for the world’s most demanding and complex service delivery environmentsNETSCOUT is the market leader in Unified Service Delivery Management enabling comprehensive end-to-end network and application assurance. For 28 years, NETSCOUT has delivered breakthrough packetflow technology that provides trusted and comprehensive real-time network and application performance intelligence enabling unified assurance of the network, applications and users.

NETSCOUT SOLUTIONS:• nGeniusOne

• unified performance management platform converges network and application performance management

• deliver holistic service visibility across application tiers, end-to-end networks, and diverse user devices

• provides one cohesive, consistent set of analytics and views, based on one common database of metadata

• improves communication and collaboration across the different functional IT groups to enable unified service delivery management for complex, distributed IT services.

• nGenius InfiniStream• a purpose-built, high capacity deep packet inspection appliance• performs real-time analysis of network traffic• captures and stores native network packets to support

extensive back-in-time forensic analysis capabilities

• nGenius series Packet Flow Switch• a compact, cost-effective, high performance network monitoring switch• reduce undesirable bandwidth bottlenecks• reduce unnecessary consumption of ports for inter-switch links• simplify monitoring architecture• ease manageability and provisioning

MAIN SECTORS OF CUSTOMERS:• Banking• VISA/MasterCard organizations• Stock Markets• TELCO / Service Providers• Enterprise

[email protected]

Page 17: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

17 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

[email protected]

Application performance management across LAN, WAN and wireless networksFluke Networks offers best of breed solutions that span network deployment, network perfor-mance management and troubleshooting, as well as security and performance monitoring. Fluke Networks solutions are trusted by:

Network professionals to help them deploy, manage and troubleshoot business critical networks

Agencies, Enterprises & Carriers around the world

By 98 of the Fortune 100 Companies

MAIN SOLUTIONS• TruView

Monitor the availability and performance of applications and VoIP services to ensure your users can access the business applica-tions they need to do their jobs:

• Isolate problem areas and respond quickly to keep business users connected and productive

• See results in dashboards and get alerts to solve network issues before they affect users• Scale up as you need to monitor more locations or services

• OptiViewAll-in-one dedicated tablet for automated network and applica-tion analysis. The Network Engineers’ fastest way to “Prove it’s not the network” and find root cause.

• Network analysis - wired and wireless network monitoring tool• Instant network mapping and network path analysis speeds

“time to know”

• Quick analysis and diagnosis of network vs. application problems• Line-rate network packet capture and analysis (1G / 10G)• Assess network quality for VoIP/Video/UC deployments• 802.11ac WLAN planning, deployment, troubleshooting• End-User Response Time analysis from TruViewTM• Pair with  TruViewTM  Live  for 24x7 network monitoring end-to-end availability and

performance of network infrastructure, SaaS applications and VoIP services

• VSS MonitoringVSS Monitoring provides the physical devices and in-novative software and hardware  technologies  that give you complete control over visibility into your net-work, and allow your tools to operate from anywhere. VSS offers the widest range of devices to suit your network: from a single network TAP, to a 600-port chassis, to a 4000+ ports interconnected system. All VSS network packet brokers and TAPs are interoperable; all designed and produced “in-house” based on a unifying platform to ensure compatibility and scalability.

• AirMagnet EnterpriseA full-time wireless intrusion prevention sys-tem (WIPS), wireless intrusion detection system (WIDS) and WLAN security monitoring system that provides dedicated monitoring of the airspace to enable the security, performance and compliance of wireless LANs. AirMagnet Enterprise is used by or-ganizations for the most complete WIPS and WIDS, remote network troubleshooting, enforcing no-wireless zones, and proving compliance.

SEE MORE

Page 18: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

18 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

[email protected]

Link load balancing appliances for business continuity, Internet and WAN redundancyWith today’s growing Internet demands, Elfiq Networks enhances network performance and busi-ness continuity through innovative link balancing, cloud computing and bandwidth manage-ment technologies. Using Elfiq Networks Link Balancers, companies can leverage simultaneous ISPs, mix public and private links for added flexibility, seamless failover, increased throughput and smarter WAN path selection. Every day, local and global organizations of all sizes and verticals rely on Elfiq Networks’ Link Balancers and advanced network solutions.

KEY BENEFITS: Save on the cost of your bandwidth Gain total control over your network by leveraging your unused bandwidth Allocate bandwidth automatically when and where it counts, for customer and staff Guarantee uninterrupted internet access by relying on seamless ISP redundancy Benefit from tested business continuity solutions for Enterprise and the Public Sector

All LBX models benefit from multicore performance, and are designed to support Elfiq Net-works’ Flex Multipath Routing technology in addition to providing advanced Link Balancing features for guaranteed Cloud connectivity. These models can be deployed in any context, from remote, single branch offices to large corporate data centres or international organizations with multiple locations across the world.

The Link Balancer can provide your organization with the ultimate bandwidth management tool, not only for ensuring that your company never loses its internet connection, but also to provide you with full control over it.

ELFIQ LINK BALANCER MODELS: LBX400 LBX700 LBX900 LBX2600

LBX5500

Elfiq Link Balancers are also available in a virtual format. In terms of specifications, the VLB models are identical to the entire LBX series. They have been tested to match or exceed their hardware-based equivalents provided that sufficient hardware resources have been allocated.

SEE MORE

Page 19: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

19 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

Free Trial: setup in your own test environment

Protect your IT infrastructure from unauthorized changesNetwrix Corporation is the IT auditing company, providing software that maximizes visibility into who changed what, when, where and who has access to what. Over 6,000 customers worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits and increase the efficiency of IT operations.

NETWRIX AUDITORNetwrix Auditor platform maximizes visibility of IT infrastructure changes and data access by providing actionable audit data about who changed what, when and where and who has access to what. Netwrix Auditor helps prevent security breaches caused by insider attacks, pass audits and minimize compliance costs or just keep tabs on what privileged users are doing in the environment and why.

NetWrix supports the broadest variety of audited systems and applications, including:• Active Directory• Exchange• Windows Server• File Server• SharePoint• VMware• SQL Server

NETWRIX AUDITOR BENEFITS: provides clear, actionable information about every

change and data access attempt supports both agentless and lightweight agent-

based modes of operation a truly integrated solution easy to install and configure, with no professional

services required

[email protected]

Page 20: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

20 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

08

wwww.bakotech.pl · cee.bakotech.com

Rozwiązania:

· Network Performance Monitor – automatycznie wykrywa Twoje urządzenia sieciowe i sprawdza na bieżąco ich status

i statystyki. Wyniki są prezentowane w przejrzysty sposób, a NPM alarmuje użytkownika o potencjalnych i rzeczywistych

problemach sieciowych

· NetFlow Traffic Analyzer – NTA dokładnie oblicza jak Twoja sieć jest używana, przez kogo i do jakich celów. Obowią-

zują cztery zasady – Kto, Co, Kiedy i Gdzie

· VoIP & Network Quality Manager – VNQM łączy w sobie Cisco IP SLA i Call Detail Records (CDRs), aby dostarczać

kompleksowy obraz połączeń VoIP. VNQM daje wszechstronne narzędzie do monitorowania sieci i kwestii związanych

z jej wydajnością

· IP Address Management – IP AM to efektywne zarządzanie, monitorowanie, planowanie, kontrolowanie, śledzenie

i raportowanie przestrzeni IP użytkowanej w sieci

· User Device Tracker – UDT pozwala uzyskać wiedzę na temat tego, kto i co łączy się z siecią firmową w celu szybkiego

rozwiązywania pojawiających się problemów oraz podniesieniu poziomu bezpieczeństwa

· Network Configuration Manager – NCM zapewnia automatyczne zarządzanie urządzeniami w sieci w celu usprawnie-

nia zadań konfiguracyjnych i utrzymania kontroli zmiany dla zwiększenia efektywności operacyjnej i wydajności sieci

· Storage Manager – STM pozwala uzyskać informacje związane ze zużyciem i wydajnością działania pamięci.

STM zapewnia widoczność dla każdej warstwy pamięci oraz dostarcza wiarygodnych i dokładnych danych statystycz-

nych na temat przydzielonych i wolnych przestrzeni, dzięki czemu administrator może monitorować aktualne wykorzy-

stanie zasobów i planować dalszy rozwój

· Log and Event Manager – monitoruje dane z urządzeń w sieci i automatycznie je identyfikuje, wykrywając

podejrzane incydenty bezpieczeństwa oraz aktywnie ochrania sieć w czasie rzeczywistym, korelując zdarzenia na wielu

urządzeniach

Lider w dostarczaniu nadzwyczajnie prostych rozwiązań w dziedzinie zarządzania sieciami

Firma SolarWinds Inc. – jest producentem zaawansowanych systemów zarządzania

siecią przeznaczonych dla małych i dużych firm.

Celem SolarWinds jest tworzenie innowacyjnych rozwiązań w celu uproszczenia

zarządzania sieciami w różnych środowiskach.

Jeśli myślisz o wprowadzaniu innowacji w obszarze:

· Zarządzania siecią, aplikacjami i serwerami

· Monitorowania sieci i aplikacji sieciowych

· Procedur zgodności i bezpieczeństwa sieciowego

· Zarządzania konfiguracją sieci, przepływami czy IP SLA

· Usług VoIP

· Pamięci masowej, wirtualizacji, zarządzania logami czy korelacją zdarzeń

…sprawdź SolarWinds

ZOBACZ WIĘCEJ

SEE MORE

Leader in delivering unexpected simplicity in network managementSolarWinds Inc. mission is to provide purpose-built products that are designed to make IT professionals’ jobs easier. Solarwinds offers value-driven products and tools that solve a broad range of IT management challenges – whether those challenges are related to networks, servers, applications, storage or virtualization. SolarWinds approach is to deliver „unexpected simplicity” and innovative solutions to simplify network management in different environments.

SOLARWINDS SOLUTIONS:• NETWORK PERFORMANCE MONITOR

NPM automatically discovers your network devices and will then constantly poll them for status and statistics. Results are clearly displayed and NPM will alert you about potential or actual network problems

• NETFLOW TRAFFIC ANALYZERNTA quantifies exactly how your network is being used, by whom, and for what purpose.

• VoIP & NETWORK QUALITY MANAGERVNQM Combines Cisco IP SLA and Call Detail Records (CDRs) monitoring to deliver comprehensive VoIP Monitoring. VNQM delivers a powerful network monitoring solution for identifying site-specific and WAN-related performance issues from the perspective of each of your remote sites.

• IP ADDRESS MANAGEMENTIPAM refers to the ability to effectively manage, monitor, plan, control, allocate, track, and report on the IP space used in a network

• USER DEVICE TRACKERUDT lets you know who and what are connecting to your network at all times for fast troubleshooting increased security, and effective switch port capacity planning.

• NETWORK CONFIGURATION MANAGERNCM provides automated network device management to streamline configuration tasks and maintain change control for increased operational efficiency and network performance.

• STORAGE MANAGERSTM provides meaningful insight and reporting into storage usage and performance from starting point all the way to the endpoint. STM provides powerful visibility from every storage layer from Raw to Raid/Pool, LUN and also to the endpoint Datastore, VMDK or Physical host. STM provides real and accurate statistical data on space allocated and free, allowing administrators to monitor use and accurately plan for expansion

• LOG & EVENT MANAGERMonitors log data from devices on the network and automatically identifies, notifies and responds to suspicious behavior. LEM is not a passive log monitoring tool. LEM actively defends the network, in real time, by correlating events across multiple devices.

If you are thinking about trying innovations in the following areas: network, applications, and servers management network & applications monitoring compliance and network security procedures network configuration, flows and IP SLA management VoIP services storage, virtualization, log management and event correlation

… choose SolarWinds!

[email protected]

Page 21: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

21 cee.bakotech.com | www.bakotech.pl |BAKOTECH 2016

FREE TRIAL

Network Management SoftwareAxence Software Inc. is a privately held company founded in 2005. They are commited to excellence in the research and development of innovative network management solutions. Axence main product line – Axence nVision is an application which has been continuously and intensively developed and improved for more than 7 years – its high quality, innovation and stability is best confirmed by the dynamically growing number of customers worldwide, including U.S. Air Force, IBM, Miele, Nestle, Cabinet Office UK, Siemens and many others. The software received awards from Microsoft, IT Professional magazine and is recommended by BSA.

MODULES:• NETWORK – proactive network monitoring and visualization

• INVENTORY – hardware and software inventory

• USERS – advanced user monitoring and workstation usage statistics

• HELPDESK – remote technical support for usere

• DATAGUARD – protection against data leaks

BENEFITS OF AXENCE nVISION:real-time visualization with network maps and chartspreventing failures with expensive system of alarms and corrective actionseffective infrastructure management and rapid audit of licensesmonitor and reduce the IT operating costssoftware costs reduction, avoiding penalties for illegal softwareprotection against threats, preventing data leaks

Axence nVision will provide a return on investment very quickly. The benefits that the software brings not only affect the rationalization of network administration but also stimulate the effectiveness of practically all business processes inside a company. Axence solutions have been prepared in response to some of the most problematic issues of today’s business.

[email protected]

Page 22: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

22 | www.bakotech.pl | cee.bakotech.com BAKOTECH 2016

Bakotech – Additional Services

Business ModelBakotech as a Value Added Distributor provides to its Partners wide variety of IT distribution services enabling them to be more efficient in business development and improving their competitive position on the market. Within the range of services Bakotech CEE offers free consultancy for its Partners, presales, postsales, marketing and logistics supports as well as set of authorized trainings related to distributed solutions.

ServicesSales & Presales Support single point of contact - dedicated sales manager technical consultancy webinars, workshops, seminars, conferences product tests RFP/RFI customer references

Finance & Logistics credit flexible payment terms fast and reliable delivery ship products directly to end-user (option) insurance of shipments

For free support services you can reach us via:

e-mail address: [email protected]

www: http://cee.bakotech.com/support/

phone: +48 12 376 95 08

Monday to Friday, 9:00 AM - 5:30 PM CETIn addition, to provide better business conditions and competitive advantages to its Partners, Bakotech CEE offers paid, prepared on regular basis or on demand trainings and implementation services.

Helpdesk warranty & post warranty support postsales support (within agreed

conditions)

Page 23: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

Poland

Slovakia

Hungary

Slovenia

Croatia

Czech Republic

Romania

Bulgaria

Lithuania

Latvia

Estonia

Poland

Slovakia

Hungary

Slovenia

Croatia

Czech Republic

Romania

Bulgaria

Lithuania

Latvia

Estonia

Page 24: SOLUTIONS - Endpoints, Network & Mobile Protection ... · SolarWinds – advanced network management systems pg 20 Axence – comprehensive management of computer networks pg 21

| www.bakotech.pl | cee.bakotech.com

„Become our Partner – Let’s work together”

BAKOTECH Ltd.34 Tomasza str., office B0931-027 KrakówPolandPhone: +48 12 376 95 08

[email protected]