Microsoft Partners Dubai UAE

The Microsoft Partner Network is a hub of people, resources, and offerings brought together to give you everything you need to build and deliver successful solutions for your customers. Microsoft technology is used by most businesses across the world from Microsoft teams to any of Microsoft’s large range of infrastructure solutions. Net Desire is an authorized Microsoft Partner in the UAE offering services in Dubai. An authorized Microsoft Partner and reseller in Dubai, we are specialized in offering Microsoft’s wide portfolio of products, solutions, and support services for enterprises in all business sectors. We are providing various Microsoft solutions and products like Microsoft Office 365 licenses, Microsoft teams, Windows Server in Dubaiand across the UAE.Net Desire also have the in-house proficiency and understanding in providing Microsoft solution and support services from its wide-ranging portfolio. We provide certified experts who will guide you about the best and latest Microsoft products and solutions that suit your business needs. Our highly skilled infrastructure engineers provide a range of conferring, sales, and support services to ensure best practices and optimize your infrastructure. It can help with the consulting, design, implementation, and support of deployments across on-premises or Microsoft Cloud solutions.

Read More

Endpoint Protection Dubai

Endpoint security, or endpoint protection, is the part of cybersecurity process to safeguard endpoints – such as desktops, laptops, and mobile devices – from attackers activities. Endpoint protection is the solution to avoid file based attacks in desktops or computer devices. Examples of endpoint devices include: Laptops Tablets Switches Digital printers The endpoint landscape is constantly changing, and businesses of all sizes are attractive targets for cyber attacks. At Net Desire, we put best-of-breed technologies into action, so security becomes a business enabler — not an everyday distraction. Our portfolio covers every aspect of Endpoint security and risk management, from initial assessment through to program planning, hands-on deployment and round-the-clock support. With Net Desire Technologies, You get outstanding IT Security Expertise:  Our highly-skilled team goes beyond provisioning technologies. We solve business challenges.  You get practical, actionable advice on how to achieve the greatest business value.  We work alongside you at every step to plan and deliver solutions. We deploy solutions right first time, so they live up to their promises. We transfer skills so you can manage solutions yourself — or you can ask us to share the workload using our consultancy and support services. We’ll keep you informed about key innovations in security, so you’re always in the know.

Read More

Email | Antispam | Spoofing mails protection Dubai

Email spoofing is the process of sending of emails with a fake “from” address. Through a spoofed email address the attackers are able to get the trust of users. You have to make sure the emails your website and firms sends are marked as authentic. More than 95% of the mails sending though the internet are spam mails. If you website domains are being used for creating spam emails, the they can easily take the passwords by sending phishing emails. How to do Email Protection in Dubai SPF: Issue DNS records to keep a track on which server has the permission to send emails from your domain. DKIM: Use digital signatures to authorize that the emails are securely sending from your domain. Antispam protection Dubai Kaspersky Secure Mail Gateway is a solution to filter messages and remove spam mails. The anti spam engine can scan the spam mails.  The scanning starts from the message orgin and then the content of message. Kaspersky has achieved more first places in independent tests than any other security vendor. And we do this year after year. Kaspersky has once again named a 2019 Gartner peer insights customers choice for Endpoint protection platforms, having received a high customer satisfaction rating 4.7 out of 5. Spoofing mails protection Dubai Spoofing mail is a technique used by the attackers through that they gain the trust of users by pretending that they send emails from a person or organization that he already is in connect. E-mail is now the most widely used method of communication between businesses and individuals, it should be the safest and most reliable. unfortunately, virus-infected e-mails and wiretapping on network lines are the main reasons that affect the reliability of e-mail. A mail security product is designed to protect the email vector from threats entering the network. Mail security product checks the sender address of mail, scans the attachment, content of mail.

Read More

Server Protection Dubai | UAE

What is server security? Why it is important Server security is nothing but the set of software used to protect the server of an organization as well as the resources of servers. Attackers are more interested to target the servers since it holds the most sensitive data. To provide more security for the servers, the security must be enabled as layers. For maximum protection, you need to address potential issues in your network, the server’s operating system, and any applications or software hosted on your server. Powerful, Server-specific Protection Protect the applications and data at the core of your organization; whether that data is on physical servers or virtual servers in the cloud or on premises. Sophos Server Protection integrates anti-ransomware, application whitelisting, along with our advanced anti-malware and HIPS providing easy, centralized management of the security of all servers.

Read More

What’s new in ESET PROTECT 8.1

ESET PROTECT 8.1 is an enterprise-grade security management solution providing visibility, management and reporting across all operating systems. The list below contains information about the major changes in ESET PROTECT version 8.1: Automatic upgrade of the ESET Management Agent to the latest compatible version—ESET PROTECT 8.1 provides an automatic upgrade (auto-upgrade) of ESET Management Agent on managed computers. Native ARM64 support—ESET PROTECT 8.1 provides Native ARM64 support for the ESET Management Agent for Windows. Support for VMware Instant Clones—ESET PROTECT 8.1 supports VDI environments, cloning of machines and non-persistent storage systems. This feature is necessary to set up a flag for the master computer or resolve a question that appears after cloning or a change of hardware. For more information, visit the Online Help topic. Simplification of EDR deployment to client workstations—ESET PROTECT 8.1 allows the possibility to create an all-in-one installer that includes EEI Agent. It also allows the possibility to deploy the EEI Agent to managed devices using one-click wizards. Figure 1-1 System requirements and supported operating systems for ESET PROTECT 8.1 Click the appropriate link below to view details about system requirements and supported operating systems: Hardware requirements for ESET PROTECT Supported database servers Supported operating systems Known Issues Visit our Knowledgebase article for the latest known issues in version 8.1 of ESET PROTECT. Frequently Asked Questions How do I install ESET PROTECT 8.1? Visit our Knowledgebase content for instructions on how to set up ESET PROTECT. ESET PROTECT 8.1 does not support upgrading from ERA 6.4, only from ERA version 6.5 and later. How to upgrade ERA version 5 or 6.5 or ESMC 7.x to ESET PROTECT version 8.1? Visit our Online Help topic to view the upgrade, migration and reinstallation procedures. Which version of ESET Remote Administrator (ERA) or ESET Security Management Center (ESMC) can you upgrade to? Determine which version of ERA or ESMC you can migrate or upgrade to. Available support resources ESET provides support in the form of User Guides, fully localized application help, an online Knowledgebase, and chat, email or phone support if available in your region. ESET PROTECT Online Help contains comprehensive reference information for system settings, configurations, installation scenarios and more. ESET PROTECT Installation/Upgrade contains content for the installation process, upgrade procedures and using the migration tool. ESET PROTECT Administration contains content for how to manage and configure ESET PROTECT, including post-installation tasks and licenses. Virtual Appliance Deployment contains content for deploying ESET PROTECT in a virtualized environment. Visit www.eset.com/support/contact to email ESET technical support or contact your local ESET partner for support. For other questions, such as troubleshooting, FAQs and tutorial videos, you can search the ESET Knowledgebase. For ESET PROTECT business product videos, see the ESET Knowledgebase YouTube channel. Changelog Version 8.1.13.0 (hotfix) Released: June 24, 2021 ADDED: Automatic upgrade of the ESET Management Agent to the latest compatible version ADDED: Native ARM64 support for the ESET Management Agent for Windows ADDED: Support for VMware Instant Clones ADDED: Ability to look up a specific computer based on the last logged user parameter ADDED: New audit information on the policy screen (Modification time, Last modified by, and Creation time) ADDED: New ESET Enterprise Inspector (EEI) permissions ADDED: Possibility to create new notifications based on the severity score (determined by EEI rule severity) and the computer severity score that comes from EEI ADDED: Possibility to create an All-in-one installer that also includes the EEI agent ADDED: Possibility to deploy the EEI Agent to managed devices using one-click wizards ADDED: Upgrade outdated products in a computer group ADDED: Upgrade outdated operating systems in a computer group ADDED: Ability to copy a license Public ID to the clipboard via a context menu in License Management ADDED: Ability to filter licenses on the license management screen based on the Public ID ADDED: Automatic resolution of HIPS logs ADDED: Computer description as a new attribute in Device Identifiers under computer details ADDED: Default filter on the Detections screen (unresolved detections first) ADDED: Ability to use a second license to activate ESET Dynamic Threat Defense in a software installation task when an eligible endpoint product is selected ADDED: Expiration time for client task triggers (Triggers tab) ADDED: New report: Computer Hardware Overview ADDED: Information when less secure certificates (SHA-1) are used ADDED: An option to keep system applications installed in Device owner enrollment (Mobile Device Management) ADDED: An option to remove mapped domain users ADDED: Support for the migration and backup of ESET Full Disk Encryption (EFDE) recovery data ADDED: A new client task: “Generate new FDE Recovery password” (available from EFDE client version 1.3 (EFDE – purchased separately)) ADDED: Ability to retry encryption from the console if encryption fails (available from EFDE client version 1.3 (EFDE – purchased separately)) IMPROVED: ESET Full Disk Encryption status now provides more details and is more interactive IMPROVED: Pause a task for ESET Full Disk Encryption (capability to select an exact date and time) IMPROVED: Extended Hardware inventory details for a device with encryption-related fields IMPROVED: Extended information in detection details IMPROVED: The Syslog export is extended with “Action” and “Handled” flags for various detection logs IMPROVED: A recommendation message is displayed when the administrator tries to run a client task on more than 1,000 individual devices (using a group is recommended) IMPROVED: A recommendation message is displayed when the administrator tries to assign a policy to more than 200 individual devices (using a group is recommended) IMPROVED: Upgraded the MySQL server to version 8.0 in the ESET PROTECT appliance IMPROVED: Upgraded the Webmin interface in the ESET PROTECT appliance IMPROVED: An explanation message to the user when inserting a bundle license containing EDTD to ESET PROTECT stating that it must be linked via ESET Business Account (EBA) IMPROVED: Various UI and UX improvements CHANGED: The CRON trigger can be planned for LOCAL or UTC time only CHANGED: The Wipe task has been dropped because it does not work properly in newer Android versions. The Factory Reset task remains the only task for both Apple and Android devices. CHANGED: Adjustments related to managed products name changes FIXED: Disk encryption managed by

Read More

What’s New in Sophos EDR 4.0

We are pleased to announce that today May 19, 2021 we have released some exciting updates for all customers using Sophos EDR (Endpoint Detection and Response) with Intercept X Advanced with EDR and Intercept X Advanced for Server with EDR. What’s new? Introducing the Sophos Data Lake The Sophos Data Lake stores critical information from your EDR-enabled endpoints and servers, which means you get access to that data even if those devices are currently offline. In addition to being able to get key data from devices even when they are not online (for example if knocked offline during an attack, or a misplaced laptop) the Sophos Data Lake also enables event correlation on a much broader scale. For instance, being able to quickly identify that a suspicious account is logged in across multiple devices. Then when you have identified an area of interest you can query the device with Live Discover and get incredibly rich, live data and remotely access the device via Live Response to take appropriate action. It’s the best of both worlds. You get 7 days of retention in the data lake as standard (30 days with Sophos XDR) which is in addition to the existing up to 90 days of data stored directly on devices. Please note that you need to enable the Sophos Data Lake. In your Sophos Central console select ‘Global Settings’ then under Endpoint or Server Protection (or both) select the ‘Data Lake uploads’ setting and turn on the ‘Upload to the Data Lake’ toggle. From the same window you can also select which devices send data to the Sophos Data Lake. The Sophos Data Lake is available now for Windows and Linux devices. Mac support will come later this year. Scheduled queries One of the top requested features, this release introduces scheduled queries so you can have critical information ready and waiting for you. Queries can be scheduled to run overnight so key data is ready for assessment the next day. To set up a scheduled query you first need to choose a query by going to the ‘Threat Analysis Center’ and then ‘Live Discover’. When you have selected the query you want to run you will see a new option to schedule the query instead of running it immediately. When the query has been successfully scheduled it will appear in your ‘Scheduled Queries’ list. Scheduled queries are available now for Sophos Data Lake queries. Windows and Linux devices can use scheduled queries now with Mac support coming later this year. Scheduled queries for on-disk queries are coming later this year. Enhanced usability Work even faster with enhancements to workflows and pivoting. You’ll get to key information faster and be able to take actions and respond even more quickly. Sophos XDR Today we are also releasing Sophos XDR (Extended Detection and Response). Sophos XDR goes beyond endpoints and servers, pulling in rich Sophos Firewall and Sophos Email data with more XDR-enabled products coming soon. Here are just a few Sophos XDR use cases: IT Operations Threat Hunting Identify unmanaged, guest, and IoT devices Extend investigations to 30 days without bringing a device back online Why is the office network connection slow? Which application is causing it? Use ATP and IPS detections from the firewall to investigate suspect hosts Look back 30 days for unusual activity on a missing or destroyed device Compare email header information, SHAs, and other IoCs to identify malicious traffic to a domain  

Read More

Acronis- Top 5 Vulnerabilities of SMBs

Cyberattacks can cause several different types of losses to your business. Loss of access to vital customer information or critical financial data can be detrimental. Brand reputation can be impacted if customers lose faith. Understandably, over the last year, cybersecurity has dropped in priority for many businesses. Yet, now is the time for a focus on cyber protection. Security risks and breaches have always been a focus for small and medium-sized enterprises, but as we know from the Cyberthreats Report, the intensity is increasing exponentially. However, many small- and mid-sized business owners say they lack the time or resources to tackle cybersecurity issues effectively. “Knowledge is power,” as the adage says. Knowing where your business is vulnerable to a cybercriminal’s endeavors is the first step to cyber protection and mitigating risk. In this infographic, we take a look at the top 5 SMB vulnerabilities.

Read More

ARCSERVE SOLUTIONS SECURED BY SOPHOS

Integrated cybersecurity and data protection for on-premises, cloud, and SaaS-based data. RANSOMWARE HAS BECOME THE BIGGEST RISK TO Cybercrime Magazine estimates a ransomware attack to occur every 11 seconds by 2021. It’s time to fight back with the only means to neutralize cyberattacks, including ransomware, without the complexity of siloed cybersecurity and data protection strategies. The end result? A proactive, multi-layered data and ransomware approach that helps you reach IT resiliency faster. A FIRST AND LAST LINE OF DEFENSE Protecting your infrastructure from security threats, data loss, and downtime is tough enough. But, juggling multiple strategies, processes, vendors, SLAs, and support teams only adds complexity and leaves you open to security gaps and data erosion. Arcserve’s data and ransomware protection was designed to meet the demands of today’s IT by removing standalone, discrete products while delivering proven, all-in-one cybersecurity, backup, and disaster recovery (DR). HARNESS THE POWER OF INTEGRATION Powerful integration brings you a first and last line of defense against cyberattacks and data loss, for peace of mind that your business can withstand any threat. NOW YOU CAN: Defend your backups with Sophos Intercept X Advanced, cutting-edge cybersecurity that uses a deep learning neural network to detect both known and unknown malware without relying on signatures. Rapidly respond and remove threats with CyptoGuard and WipeGuard, which use behavioral analysis to stop never-before-seen ransomware and boot-record attacks. Deploy immutable backups with heterogeneous, image-based data protection that safeguards on-premises, cloud, and SaaS-based data from external threats, major disasters, human error, or other unplanned outages. If needed, safely spin up copies of physical and virtual systems onsite and offsite, or in private and public clouds. Threats are neutralized while data loss and downtime are eliminated.

Read More

Safetica 9.9 version is available for upgrade

Security or uninterrupted work? With Safetica 9.9 you get both. A healthy balance between tight security and a pleasant user experience has always been Safetica’s priority. With the latest version, DLP blocking policies do not necessarily interrupt users’ work, since the admin can allow trusted users to override DLP policies and perform their desired actions without asking for help. Such events are recorded and can easily be audited. Thanks to users’ comments, the admin will be able to understand the context of the events much more clearly. User override can be configured for each policy, enabling you to control which situations and users should be allowed this flexibility. Control when file content scan is needed and when it is not When your users repeatedly work with sensitive data and you know they do so in a secure way, there’s no reason why DLP should slow down their work. With the new Safetica version, simply create a top priority “allow” policy which describes safe operations, places, and users. Safetica will stop file scanning for such events and will allow users to work at full speed. Simple as that. Control data upload to non-company Git repositories Whether you use Git for managing source code or as a document versioning system, Safetica can now help your users work with Git securely. Work with company repositories remains 100% uninterrupted, but you can easily prevent users from pushing changes and data to non-company repositories. Performance and security improvements As usual, the new version comes with dozens of optimizations and bug fixes, this time focused on backend performance and faster work with records in both Safetica Management Console and WebSafetica. Safetica Mobile users will surely welcome the increased security of our new iOS certificates. Announcing public beta of Safetica 9.10 with OCR! For the first time ever, we are announcing the availability of a public beta for an upcoming version of Safetica 9.10. It will include Optical Character Recognition (OCR) and brand new content inspection technology. OCR allows you to inspect scanned PDF documents and image files and protect them the same way as other documents. With the new content inspection technology, you also get better control over what files should be inspected and an extended list of supported file types. We have already tested the beta version thoroughly but want to validate its real-life performance on more variable environments. Once we are 100% certain that everything works flawlessly, we will make Safetica 9.10 available to all our customers. A healthy balance between tight security and a pleasant user experience has always been Safetica’s priority. With the latest version, DLP blocking policies do not necessarily interrupt users’ work, since the admin can allow trusted users to override DLP policies and perform their desired actions without asking for help. Such events are recorded and can easily be audited. Thanks to users’ comments, the admin will be able to understand the context of the events much more clearly. User override can be configured for each policy, enabling you to control which situations and users should be allowed this flexibility. Control when file content scan is needed and when it is not When your users repeatedly work with sensitive data and you know they do so in a secure way, there’s no reason why DLP should slow down their work. With the new Safetica version, simply create a top priority “allow” policy which describes safe operations, places, and users. Safetica will stop file scanning for such events and will allow users to work at full speed. Simple as that. Control data upload to non-company Git repositories Whether you use Git for managing source code or as a document versioning system, Safetica can now help your users work with Git securely. Work with company repositories remains 100% uninterrupted, but you can easily prevent users from pushing changes and data to non-company repositories. Performance and security improvements As usual, the new version comes with dozens of optimizations and bug fixes, this time focused on backend performance and faster work with records in both Safetica Management Console and WebSafetica. Safetica Mobile users will surely welcome the increased security of our new iOS certificates. Announcing public beta of Safetica 9.10 with OCR! For the first time ever, we are announcing the availability of a public beta for an upcoming version of Safetica 9.10. It will include Optical Character Recognition (OCR) and brand new content inspection technology. OCR allows you to inspect scanned PDF documents and image files and protect them the same way as other documents. With the new content inspection technology, you also get better control over what files should be inspected and an extended list of supported file types. We have already tested the beta version thoroughly but want to validate its real-life performance on more variable environments. Once we are 100% certain that everything works flawlessly, we will make Safetica 9.10 available to all our customers.

Read More

Fortinet Again Named a 2021 Gartner Peer Insights Customers’ Choice for Network Firewalls

Fortinet is proud to announce that, for the second consecutive year, we have been recognized as a Customers’ Choice in the April 2021 Gartner Peer Insights ‘Voice of the Customer’: Network Firewalls report. Additionally, Fortinet was named a Customers’ Choice for the second year in a row in the February 2021 Gartner Peer Insights ‘Voice of the Customer’: WAN Edge Infrastructure for Fortinet Secure SD-WAN. Fortinet was also recognized as a Leader in both the 2020 Gartner Magic Quadrant for Network Firewalls and WAN Edge Infrastructure reports. We continue to differentiate ourselves from the competition by accelerating convergence of networking and security using a single platform. The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and the overall user ratings. To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors with a high customer satisfaction rate. We take great pride in this distinction, which is entirely based on the reviews of customers across industries, company sizes, and regions. And with 1,713 reviews as of April 15, 2021, Fortinet has the most total reviews of any vendor in the Network Firewalls market. Fortinet also scored highest in the enterprise data center Use Case for two consecutive years in the 2019 and 2020 Gartner Critical Capabilities for Network Firewalls reports with scores of 3.67/5 and 3.71/5 respectively. As an integral part of the Fortinet Security Fabric, our FortiGate Next-Generation Firewalls (NGFWs) enable a Security-driven Networking approach to protect any network edge and any user at scale, while ensuring high performance. And powered by Fortinet’s custom built Security Processing Units (SPUs), FortiGate NGFWs offer the industry’s highest security compute rating. With FortiGate NGFWs, organizations can: Manage internal and external security risks: FortiGate NGFWs provide complete visibility into applications, threats, and networks to keep operations running and ensure business continuity. Further, network-based segmentation stops lateral threats and protects against application vulnerabilities with enhanced AI/ML powered by FortiGuard services to thwart cyberattacks. Achieve optimal ROI through consolidation: FortiGate NGFWs seamlessly converge and accelerate networking and multiple security functions into a single solution to reduce cost and optimize user experience. Improve operational efficiency: Fortinet’s Fabric Management Center streamlines operations across Security Fabric and extends beyond to 400+ ecosystem integrations with a consolidated view to simplify enterprise-wide workflows. Here is a small sampling of the top reviews posted by Fortinet customers on the Gartner Peer Insights website*: “Stable and Reliable Firewall” — Cloud Infrastructure Engineer in the Finance Industry, Firm Size: 50M-250M USD Overall user rating: 5/5 stars “We use FortiGate in our company’s HQ and many of the branches across the country. For a company that deals mainly with sensitive customers data, we needed to make sure that our networks are protected by the best firewall solution that’s available (also thanks to Gartner reviews).” “Tons Of Value in a Small Package” — Director of IT in the Retail Industry, Firm Size: 500M-1B USD Overall user rating: 5/5 stars “We decided to deploy the full Fortinet network stack including FortiGate 60E’s to all 90+ of our retail locations. We further deployed FortiGate 200E’s in HA pairs to all datacenter locations. These UTM appliances are some of the best and most feature rich I have ever used.” “Delivered What We Were Looking For” — VP, Deputy CIO in the Finance Industry, Firm Size: 1B-3B USD Overall user rating: 5/5 stars “Our experience with implementing this solution has been very satisfactory. We went with Fortinet for price and simplicity and have received what we were looking for.” “Strong Firewall Solution That Protects Your Business Systems” — Programmer in the Finance Industry, Firm Size: 50M – 250M USD Overall user rating: 5/5 stars “Very easy to implement and configure, especially if you already have other Fortinet products in your network they all bind in to the one “security fabric” and provide a great overview of all your network devices and events in your network. Also the price is superb for such product.” “NGFW That Needs To Be In Your Company” — PHP Backend Developer in the Finance Industry, Firm Size: $50M – 250M USD  Overall user rating: 5/5 stars “FortiGate NGFW is the main guard of our IT infrastructure. All network goes through it. It can easily handle all our traffic. Now, most of the employees are working from home so VPN is getting hit really bad, but that is not a problem for FortiGate.” Read more reviews for the FortiGate Next Generation Firewall. In addition to these customer recognitions, Gartner analysts have also recognized Fortinet in several of their Gartner Magic Quadrant reports, including: Gartner Magic Quadrant for Enterprise Network Firewalls (Sep 2020) Gartner Magic Quadrant for Endpoint Protection Platforms (Aug 2019)** Gartner Magic Quadrant for Security Information and Event Management (Feb 2020) Gartner Magic Quadrant for Web Application Firewalls (Oct 2020) Gartner Magic Quadrant for WAN Edge Infrastructure (Sept 2020) Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure (Nov 2020) We are proud to have again received this distinction and would like to thank all our customers who have submitted reviews. Learn more about this distinction and write your own review for the FortiGate Next-Generation Firewall on Gartner Peer Insights. *Reviews have been edited to account for errors and readability. **This research is currently archived and is only provided here for historical purposes. Gartner Critical Capabilities for Network Firewalls, Rajpreet Kaur, Adam Hils, Jeremy D’Hoinne, 10, November 2020. Gartner Magic Quadrant for Enterprise Network Firewalls, 09 November 2020, Rajpreet Kaur, Adam Hils, Jeremy D’Hoinne The Gartner Peer Insights Customers’ Choice badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advice technology users to select only those vendors with the highest ratings or other designations. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to its research including any warranties of merchantability or fitness for a particular purpose.

Read More

ESET Endpoint Security Ranked As Top Performer by AV-Comparatives

In the special business test by AV-Comparatives dedicated to Network Performance, ESET has been recognized as the most lightweight solution on market. Find out how your current business security solutions impact network performance by receiving a copy of the AV-Comparatives Network Performance Test for Business Security Software (just complete the form on this page). ESET provides multi-layered IT security solutions to enterprises worldwide. We have been pioneering proactive digital protection since 1987, and are proud to be the largest EU-based IT security vendor. ESET protects more than 100 million users globally. Our Endpoint Solutions can Protect your Enterprise Multiple layers of security to detect, block and defuse threats without affecting user experience. Simplified central management of security, and visibility across different platforms, devices and applications. Global network of support specialists, with local expertise in your language of choice. Rapid ROI, plus no need to replace hardware due to ESET’s light system footprint.

Read More

New features in the XG Firewall v18 MR5 release

Every maintenance release (MR) for XG Firewall v18 brings compelling new features, including a variety of performance, stability, and security enhancements. MR5 is no exception. What’s new in v18 MR5 VPN enhancements A huge 50% increase in concurrent IPSec VPN tunnel capacity across the line Port 443 sharing between SSL VPN and the Web Application Firewall (WAF) IPSec provisioning file support for remote access via Sophos Connect v2.1 SD-WAN Integration with Azure Virtual WAN for a complete SD-WAN overlay network Authentication Integration with Azure Active Directory (learn more) Certificate management and security Form enhancements for creating certificate signing requests and certificates Enhanced security for private keys Upload/download support for PEM format certificates Enhanced workflows for certificate management Synchronized Security Enhanced registration and de-registration in high-availability (HA) installations Missing Heartbeat enhancements to reduce notifications sent for intended/expected changes in endpoint status Sophos Central Firewall Reporting New Cloud Application (CASB) report MSP Flex Pricing for MSP partners View the full release notes on the Sophos Community Blog. Other Recent Enhancements If you’re not running the latest v18 firmware on your firewall, you’re missing out on a ton of new capabilities and dozens of resolved issues. In addition to the above, these capabilities have been added in other v18 maintenance releases: High-availability enhancements Improved FastPath support for active-passive pairs HA support in AWS using the AWS Transit Gateway Setup, reliability, and stability enhancements VPN and Sophos Connect Remote Access Client A huge increase in SSL VPN connection capacity (up to 3-6x) Remote access IPSec policy provisioning with Sophos Connect v2.1 Group support for Sophos Connect which enables imports from AD/LDAP/etc. New advanced options for IPSec remote access Sophos Connect downloads enabled from the user portal Enforcement of TLS 1.2 for SSL site-to-site and remote access VPN tunnels Synchronized Security A new option for Synchronized App Control to automatically clean up discovered apps over a month old Cloud platform support Support for new AWS instances (C5/M5 and T3) Support for cloud formation templates Virtual WAN zone support on custom gateways for post deployment single arm usage Nutanix and Nutanix Flow support Sophos Central Group firewall management via the Partner Dashboard Firmware update scheduling Multi-firewall reporting across firewall groups Save, schedule, and export reports from Sophos Central Security and authentication enhancements Stronger password hash algorithm (requires a password change) Auto web-filtering of Internet Watch Foundation (IWF) identified sites containing child sexual abuse Support for creating users with UPN format for RADIUS authentication It’s easy and free Of course, all these features are a free upgrade for Sophos customers and are as easy as clicking to upgrade your firmware in your firewall console or scheduling a firmware update through Sophos Central.

Read More
Chat With US?