Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Exclusive Networks Ltd, Alresford House, Mill Lane, Alton, GU34 2QJ
Tel: +44 (0)845 521 7217 | Web: https://www.exclusive-networks.com/uk/
ALWAYS ON | REMOTE ACCESS AND BUSINESS CONTINUITYYOUR QUICK GUIDE TO THE EXCLUSIVE NETWORKS VENDOR SOLUTIONS THAT MEET
YOUR CUSTOMERS REMOTE ACCESS AND BUSINESS CONTINUITY NEEDS
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
BROWSE BY VENDOR & BUSINESS CHALLENGE:
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Page 2
TUFIN
ANTIVIRUS
APPLICATION CONTROL/PERFORMANCE CONNECTIVITY
END POINT SECURITY SECURE ACCESS
VULNERABILITY SCANNING
ZERO TRUST NETWORK ACCESS
VIRTUAL DESKTOP INFRASTRUCTURE
NUTANIX
NUTANIX
TINTRI
TINTRI
FORTINET
FORTINET FORTINET
NETWORK PROTECTION
INFOBLOX
THALES
THALES
ORCHESTRATION AND AUTOMATION
FORESCOUT
TUFIN
SENTINELONE
SENTINELONE
PROOFPOINT
PROOFPOINT
FORESCOUT
FORESCOUT
NETSKOPE
NETSKOPE
FORESCOUT
PALO ALTO NETWORKS
PALO ALTO NETWORKS
PALO ALTO NETWORKS
PALO ALTO NETWORKS
PALO ALTO NETWORKS
PALO ALTO NETWORKS
PALO ALTO NETWORKS
PALO ALTO NETWORKS
Page 3
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Continuously monitor traffic:
Continuous traffic monitoring and policy enforcement are
essential to prevent cyber incidents. Best practices, such as
least privilege access, must be enforced. Forescout helps:
• Monitor devices that connect through VPNs
• Alert users of compliance issues automatically
• Terminate non-compliant VPN connections
SECURELY MAINTAIN BUSINESS CONTINUITY WITH A REMOTE WORKFORCE
FORESCOUT DEVICE VISIBILITY & CONTROL PLATFORM
Product Description:As businesses worldwide scramble to adapt their cybersecurity
protocols and support today’s expanded mobile workforce, bad
actors are stepping up efforts. Attacks are on the rise as IT
organisations focus on maintaining secure business operations.
Gain complete visibility and control of remote devices to protect
your organization while employees work from home.
Benefits:Discover and identify all remote devices:
Beyond user and VPN authentication, it is essential to be able to
identify devices and also categorise them as corporate-issued or
personal. Forescout helps:
• Identify devices in real time-even VPN-connected devices
• Keep devices off your network that shouldn’t be there
• Block unsanctioned BYOD systems
Extend compliance to remote devices:
Given the lax security on most home networks, device hygiene is
paramount. Essential posture checks must occur before allowing
devices on the corporate network. Forescout helps:
• Check if security agents, device patches and software are
up to date
• Remediate noncompliant devices within the remote network
• Enforce access controls based on policy
Moving Beyond VPN to Secure Your Remote Workforce – Register to watch the Webinar:Improve visibility and control of remote devices to reduce risk while employees work from home.
Device Compliance for the Remote Workforce:Automate security to improve mobile device compliance.
VPN is Back but Don’t Forget About Device Hygiene:Three security best practices that CISOs should consider to ensure the security of their organisations.
Register
Click here to view
Contact us
Request a demo
Click here to view
Page 4
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
FORTIGATE NEXT GENERATION FIREWALL + FORTITOKEN / FORTICLIENT OR FORTICLIENT EMS
Securing the Remote Workforce with FortiGate Next Generation Firewalls
Download this guide showing options for using VPN services on a FortiGate with FortiClient which includes pointers and links to download FortiClient or the FortiClient EMS Trial:
Download
Find out more on other options
Watch our on-demand technical demonstration
Click to access all information and more
• Minimised overheads with unique online activation option
• Available at 40% discount
FortiClient EMS
• Offers Full endpoint control
• Configurable so user cannot change settings and to start
VPN on boot up safeguarding the device from split tunnelling
• Easily scalable with additional licenses
• Available at 40% discount
Product Description:As part of the FortiOS operating system that resides on FortiGate
firewalls, Fortinet have bundled IPSEC client to Site and SSL
client to site VPN connectivity. This built-in capability allows
remote access security and functionality to be scaled up in one
of 3 ways.
FortiClient (free version) provides VPN Connectivity to the
FortiGate with password and user ID FortiTokens offer a more
secure solution allowing a remote worker to securely connect
in to an existing FortiGate and authenticate themselves into the
network using two factor authentication.
FortiClient EMS offer full endpoint control by unlocking the full
potential of the UTM features built into the FortiClient software
which includes Antivirus with Cloud Sandboxing, Web filtering,
Firewall (Application Control) and Vulnerability Scanning.
Benefits:FortiClient
• Free to download and ideal if you are just looking to use the
VPN elements of the client software.
FortiToken
• Offers a more secure solution, available in both physical and
software mobile form
• Reduced costs by leveraging existing FortiGate as the
authentication server.
• One-time purchase with no additional licensing required
Contact Ryan Boyle, Exclusive Networks Fortinet Vendor Product Specialist:
Contact
Page 5
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
BLOXONE™ THREAT DEFENSE
Product Description:BloxOne Threat Defense leverages the power of core network
services to provide a foundational layer of security for on-prem,
cloud and cloud-hybrid networks. Use it at this critical time to
streamline and automate threat response and create a secure
user experience that does not impede the user’s ability to work.
Product Benefits:• Detects and blocks phishing, exploits, ransomware and other
modern malware that could compromise remote workers’
devices, data, and credentials
• Prevents data exfiltration over DNS, keeping protected data
safe
• Uses a recent innovation to monitor for lookalike domains
that could be on the rise and compromise valuable internet
properties
• Enable your customers to consistently manage their security
across every business location
• Restricts user access to specific web content categories and
helps track activity
• Automates incident response so security ecosystems can
remediate incidents quickly
Expand Your BloxOne™ Threat Defense Deployment with No End-User or License Restrictions for 90 Days!
To Request Free Access on behalf of your customer:
To Request Free Access for your own internal network:
After submitting the forms, the Infoblox team will coordinate a customer follow-up call.
For further information view the Infoblox website or contact Mark Downing, Vendor Manager at Exclusive Networks, [email protected].
Infoblox can help protect you and your customer’s network when working from home. Infoblox are extending BloxOne™ Threat Defense Cloud service free for 90 days. This offer is available to you as an Infoblox partner and well as your customers
Click here
Click here
Click here
Page 6
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
NETSKOPE PRIVATE ACCESS (NPA)
Netskope Private Access (NPA) is a cloud-based zero-trust network access solution that provides fast and secure access to private applications that are hosted in public clouds or enterprise data centres, allowing employees to remain productive and protected
Product Description:Many organisations now realise that a majority of their
workforce may need to work from home as a result of COVID-19
(Coronavirus). This is putting heavy pressure on business
continuity plans as existing VPNs and on-premises VPN
concentrators do not have the capacity to handle a load of this
magnitude.
Netskope Private Access gives employees access to applications,
not the network, through a ZTNA (zero-trust network access)
approach, while providing that crucial secure access to public
cloud applications and optimising the end user experience. Netskope Private Access data sheet
Download
Product Benefits:• NPA is more secure than traditional VPN because it connects
users to authorised apps instead of networks where they
can move laterally
• NPA is part of the Netskope Security Cloud, leveraging our
New Edge globally distributed private network to ensure fast
and reliable connectivity
• No Hardware / No Cables
• No Bandwidth to order
To find out more information, please contact Ben Turnbull, Exclusive Networks Netskope Vendor Manager:
Contact
Page 7
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
XI FRAME
Product Description:Deliver virtual apps and desktops to users worldwide with Xi
Frame. Either in the cloud with AWS, Microsoft Azure or Google
Cloud Platform. Or on-premises with Nutanix AHV
Frame is a Desktop-as-a-Service (DaaS) solution that lets you
access your apps on any device and from any location. Easily
create virtual workspaces for your customers in under an hour.
Deliver virtual apps in 5 easy steps:
1. Pick your infrastructure
2. Pick your Apps
3. Integrate your authentication
4. Integrate your cloud storage
5. Access on any browser!
Benefits:• With Xi Frame, you can get your customers end users
working from anywhere in under an hour
• Deliver a secure and responsive access to applications,
desktops, and data instantly from any device or any location
at unlimited scale
• Faster time to value and removes the barriers to deliver and
consumer virtual desktops and virtual apps
Speak to Nutanix EXN Team for more information
• End User campaign available, includes:
• Email - Nurture
• Email - Test Drive Xi Frame
• Social Media Content
• Reference Material
• Unlimited user 30-day desktop-as-a-service trial
Use cases: • Create an excellent user experience at scale
• Deliver always-on availability and security
• Deploy and provision desktops in under an hour
• Enable office apps, design, CAD, 3D Modeling, animation,
gaming - no plugins required
• Pick between Google, Microsoft Azure, AWS, and Nutanix
• Improve efficiency and day-to-day management
Partners can register interest hereRun Any Software in a Browser
Contact
Page 8
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Product Description:Prisma Access is a Secure Access Service Edge (SASE) that
helps organisations embrace cloud and mobility by providing
network and network security services from the cloud. With an
increasing number of users, branch offices, data and services
located outside of the protection of traditional network security
appliances, organisations need a cloud-based infrastructure that
converges network and network security capabilities. Prisma
Access provides consistent security services and access to cloud
applications (including public cloud, private cloud and SaaS)
delivered through a common framework.
Benefits:Prisma Access delivers the networking and security that
organisations need in an architecture designed for all traffic,
all applications, and all users. Rather than creating single
purpose technology overlays that are normally associated with
point products, Prisma Access uses a common cloud-based
infrastructure to deliver security services, including advanced
threat prevention, web filtering, sandboxing, DNS security,
credential theft prevention, DLP and Next-Generation firewalling.To find out more about this solution, please contact a member of the Palo Alto Networks team:
Business Agility and Speed:
• Organisation positioned to transform towards a modernised IT environment
• Organisation can grow, expanding to new locations regionally and globally to capitalise on new initiatives
• Streamlined operations increases competitive advantage, reduces costs, increases profits
Reduces Complexity:
• Eliminate unnecessary, limited use point products
• Operate from the cloud to cut operational complexity and cost
• Avoid logistical issues with shipping, installing and upgrading hardware
Consistent Security Designed to Stop Cyberattacks:
• Consistent security policy strengthens the organisation’s risk profile
• Provides full visibility and security for all traffic
• Delivers protection to users in any location
• Delivers protection to all applications (public cloud, private cloud, SaaS, internet)
Contact
PRISMA ACCESS
Secure Access Service Edge (SASE)
Page 9
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Benefits:• Your customers will be able to implement remote access
for workers within two hours of reaching out to you and
Proofpoint
• Help your customers fulfil their business continuity strategy
with the best possible solution on the market
• Help your customers overcome VPN issues such as exposing
your DNS and IP address to the internet, poor application
performance, poor user experience and too much access for
the wrong staff
PROOFPOINT META
Product Description:Proofpoint Meta is the zero-trust alternative to VPN for secure
remote access to any enterprise application, anywhere. As
applications move to the cloud and workers are increasingly
mobile, IT teams need a better approach to providing secure
application access than the conventional, site-centric VPN.
Proofpoint have created a software-defined perimeter (SDP) and
are delivering network security from the cloud.
To find out more information, please contact Kadie Brader, Exclusive Networks Proofpoint Vendor Manager
Contact
Secure Remote Access Made Easy
Page 10
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Benefits:• SentinelOne is offering enterprises as many Core licenses as
they need, without limits and free of charge, giving you the
chance to get infront of your customers immediately
• By providing enterprises with Core, it is essentially running
a POC. The likelihood of the customer removing it post the
expiration date is low, therefore giving you the opportunity
to secure their business with the potential to also upgrade
• SentinelOne’s Core offers Prevent, detect (basic) and
respond capabilities along with reporting
To find out more about this offering please contact Greg Hewett, Exclusive Networks SentinelOne Vendor Manager:
SENTINELONE CORE
Product Description:SentinelOne, the autonomous cybersecurity platform company,
announced today that it is making SentinelOne Core available
free of charge, enabling enterprises to secure remote work as
the world combats COVID-19. SentinelOne will be available for
free beginning Monday, March 16 through Friday, May 16, 2020.
SentinelOne protects enterprises of all sizes with AI-powered
cloud native technology that autonomously identifies and defeats
cyberattacks – deployable in seconds.
SentinelOne Core: AI-powered prevention, detection, and
automated response in a single, autonomous lightweight agent;
legacy antivirus replacement across Windows, Mac, and Linux
operating systems with no connectivity or network dependency.
Contact
SentinelOne Offers Free Platform Access to Help Enterprises Embrace Secure Remote Work and Stay Protected
Register your interest
Page 11
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Help your customers to:Prevent breaches:
• Apply different MFA methods
• Control access for each application
• Eliminate passwords
Enable Cloud Transformation:
• Speed up cloud migration initiatives
• Secure cloud adoption
• Take an agnostic approach to security
Simplify Compliance:
• Track who is accessing which application, when and how
• Easily prove compliance
• Remain compliant as you grow your environment
Thales now offers Safenet Trusted Access (STA) free for 30 days! The free 30-day trial of STA includes:
• 10 free Mobilepass tokens, 2 SMS tokens
• Cloud Single Sign-On
• Built-in integration templates
• Customisable access policies
• Dashboard of access statistics
SAFENET TRUSTED ACCESS
Product Description:Thales (formerly Gemalto / Safenet) is one of the largest authentication and encryption security companies in the world and delivers their identity and data security solutions to organisations and market leaders globally.
With more organisations shifting to a remote working framework for the foreseeable future it is more important than ever to educate and assist organisations on effective ways to keep their employees and business assets safe from opportunistic hackers.
As you are probably already aware, one of the challenges faced by organisations is how to deploy efficient controls to provide employees with a secure and convenient access to their digital workplace. Therefore, enforcing a secure identity verification is essential to protect organisation’s assets and the employees.
Building on Thales’s award-winning authentication service, SafeNet Trusted Access (STA) combines authentication and access management in a fully integrated cloud service. Thales enables customers to transform their business and operate securely in the cloud by preventing data breaches, simplifying access for users, and enabling compliance.
Benefits:1. Speed of deployment: A cloud-based service means your
customers are up and running within a day
2. Secure Access: Customers gain secure access to VPNs, remote desktops, virtual environments and cloud-based services such as SFDC and O365
Contact
Cloud-based Access Management as a Service For more information visit our STA product information
Page 12
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Benefits:• Simple Deployment - Packaged as a hardware appliance,
Tintri VMstore™ goes from box to rack and running VMs in a
matter of minutes.
• Intuitive Administration - built on an application-aware
storage architecture and allows administrators to increase
productivity by directly working with vDisks and VMs
• Plug & play scalability - scaling to support thousands of
desktop VMs is easy and cost-effective—just add more
VMstores
• Industry-best virtual desktop density - With its unique
FlashFirst™ design, a single Tintri VMstore supports up to
2,000 virtual desktops with high performance and consistent
sub-millisecond latency.
• Full support for VMware Horizon View and Citrix XenDesktop
- Tintri VMstore has undergone rigorous testing to ensure
comprehensive support for major VDI platforms
Intelligent Infrastructure Webcast Series available to join or invite customers throughout April
Contact our Cloud and Data Centre Team for more information:
TINTRI VMSTORE
Product Description:The Tintri VMstore appliance is designed from scratch to fully
exploit flash technology for virtual environments.
VMstore keeps users productive, effectively handling boot
and login storms, desktop updates, and performance-hungry
applications.
Contact
Maximum Performance for Applications and the People Who Manage Them
Page 13
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
Secure Cloud Free Access & License Expansion for Existing Tufin Customers:
Tufin is a company that values supporting our customer
relationships, understand times are tough and want to help
alleviate some of the additional burden being sustained. With
the increased reliance on remote workers, cloud app utilisation
has surged, exacerbating cloud security challenges, and VPN
requirements have surged requiring an increase in firewalls.
To help our customers in this time of need Tufin is providing
free access to Tufin SecureCloud to provide immediate cloud
visibility, and is offering a free license expansion to waive the
fees from this temporary period of non-compliance. We value
your business and hope these offers can make your life a little
easier.
For more information, please contact Lauren Scully, Exclusive Networks Tufin Vendor Manager:
SECURECLOUD
Product Description:Tufin SecureCloud revolutionises cloud security. Companies
no longer need to compromise agile for secure, or secure for
agile. Leverage SecureCloud’s policy-centric automation-based
approach to secure your journey to the cloud. Gain confidence
knowing your cloud-native, hybrid cloud, and Kubernetes
applications are properly configured and secure.
Benefits:• Visibility and control
• Fast detection and mitigation
• Shift-left network security
• Generate, test and enforce micro segmentation
• Ensure continuous compliance
• Enable a zero-trust security model
• Accelerate cloud adoption and digital transformation without
compromise
ContactSecureCloud is a major new addition to the Tufin Orchestration Suite, the only platform that unifies security policy management across on-premises, cloud-native, and hybrid clouds
SecureCloud Web Page
SecureCloud Solution Brief
Addressing cloud security head-on whitepaper
Hybrid cloud security without compromise webinar
Page 14
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT
For help or further information, please contact us Exclusive Networks on Tel: +44 (0)845 521 7217
or use our contacts us page at https://www.exclusive-networks.com/uk/contact-us/
FORTINET INFOBLOX NETSKOPE NUTANIX PALO ALTO NETWORKS PROOFPOINT SENTINELONE THALES TINTRI TUFINFORESCOUT