fluke_banner_redo (002)

You can’t be productive with tools from the past. That’s why, after fourteen years,
service and calibration for the DTX Series will end in June 2018. Join the thousands
of contractors moving to the future with Versiv. Versiv delivers a 2/3 reduction in
certification costs and 10% more to your bottom line. Upgrade to Versiv with a gift
from Fluke Networks – up to $ 3.000,- discount* if you trade-in your old DTX.

And if you have a current DTX Gold agreement, get an extra incentive: up to
$ 6.000,- discount* if you trade-in your old DTX latest on March 31st, 2018.

*Discount applies to the Fluke Networks recommended list price of the regular
model numbers of the promoted instruments.

Today organisations are increasingly dependent on the performance of their business applications – which, in turn, depend on the performance of their network. To keep the business running smoothly, the performance of both applications and the network must be maintained at the highest levels. The traditional approach has been to monitor network and application performance separately, using different systems run by different teams. However, the increasing interdependency of applications and networks mean that organisations need an integrated solution if they are to identify the source of any performance problems quickly and solve them before incurring costly downtime.

A new acronym has been defined for the solutions that address this space: Application Aware Network Performance Management (AANPM). Gartner Group has now begun tracking this as a new sector, which they have termed Network Performance Monitoring and Diagnostics, and are developing a Magic Quadrant on the solutions available. This White Paper examines the need for AANPM and how it helps organisations to optimise the performance of business critical applications while speeding up network and application trouble-shooting and minimising downtime.

Download White Paper




The DTX-1200/1800 Long Term Support Policy
Long-term support for the DTX-1200/1800 Series, after 3 years, will end on June 30th,
2018, due to a shortage or lack of availability of certain crucial replacement components,
meaning you can only renew your Gold membership for another year up to June 30th, 2017.
Gold Members are entitled to a special upgrade offer!
For a limited time, your old DTX equipment is worth up to:
Terms and Conditions
• Customer must buy a DSX-5000, DSX-8000, DSX-5000Qi or any of the DSX-8000 Fiber Kits with Gold Services.
• The maximum number of DTX’s, Fiber Module Sets and/or DTX Compact OTDR Modules that will be credited cannot exceed the number of DSX’s, CertiFiber Pro Module Sets and
OptiFiber Pro Modules purchased. Note: a DSX-8000-Qi counts as 3 instruments – Copper Cable Tester, MultiMode OLTS & SingleMode OLTS. Practical example: a DTX-1800-MS
“CARE” customer is entitled to receive € 2.750,= trade-in credit when purchasing a DSX-5000Qi or DSX-8000Qi.
• Qualifying customers must have at least one unexpired Gold contract on a Fluke Networks certification product. Gold needs to be active for minimum 1 month. Any
outstanding Gold on the DTX equipment will be credited.
• Customer must return the old DTX test equipment to Fluke Networks within 30 days of the date of our invoice of the new equipment to the distributor. If instruments are not
returned within 30 days the credit note will be revoked.
• Within the European Union, the customer is responsible for shipping the old equipment to Fluke Networks. Outside the European Union the DTX instrumentation needs to be
returned to the preferred distributor.
• This offer is valid in Europe, the Middle East and Africa through participating distributors only, on made purchases between March 1, 2017 and August 25, 2017.
• This trade-in promotion may not be used or combined with any other promotion or special discount offer (including the “DealMaker”)
• This offer is subject to change without notice.
Call your Fluke Networks contact or preferred distributor to help you determine whether you are entitled to “CARE” or
“FLEX” deals. Fleet Gold customers purchasing 5 or more Versiv instruments are entitled to the “FLEX” deals. All other
Gold customers are entitled to the “CARE” deals.
Place an order with your preferred distributor for the Versiv configuration of your choice (see list of qualifying models
below) together with the credit SKUs that you are entitled to. Mention on the order the unique ID that was generated
by DSXDEAL.com. Via DSXDEAL.com you formally claim your trade-in cash back whilst generating a shipping document
and label with which you need to return the DTX equipment to Fluke Networks.
Ensure that the form generated by DSXDEAL.com is inserted in the box in which the old DTX instrumentation is
being returned to Fluke Networks. This is critical as the document contains the unique ID with which we track your
shipment once it arrives. Now Fluke Networks will credit the distributor for the amount of the credit SKUs, after which
the distributor will credit you.
Copyright © 2017 Fluke Corporation. 4/2017 3485
Credit Model Description Trade-in2

Your DTX* has served you well for years.
The only way we’d ask you to replace it
is if we had something better.
And we have something far better

By upgrading to Versiv you will have instruments
that earn you money every time you use them. On
top of that we value our Gold Customers and we’ll
prove it to you. We will give you incredible trade-in
deals to swap out your DTX devices for our new DSX
models part of the Versiv Cable Certification System.
Our best just got better, and your work output and
profits will, too.



“Cyber Security Is Not Just the Responsibility of the I.T. Department, It’s Everyone’s Responsibility.”
In recent years, coverage of Cyber Security incidents in the mainstream media has increased dramatically
to the point that it is now common for some form of incident to be reported on a daily basis. While the world
has no doubt become more aware of Cyber Security as a result of such reporting, the fact remains that Cyber
Criminals are using increasingly more complex and sophisticated mechanisms as part of their day-to-day

Download white paper

Hillstone Networks protects the networks of small to large enterprises with layered security

SUNNYVALE, Calif.–(BUSINESS WIRE)–Hillstone Networks, a leading provider of network firewall solutions, today announced it has been named to Gartner’s Magic Quadrant for Enterprise Network Firewalls* as well as the Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) for the fourth consecutive year.

Networks and critical assets need to be protected from multiple postures: server front, at the perimeter and in the cloud, for a layered security defense – this is what Hillstone delivers. Hillstone has broadened its approach from a network-centric security provider to one of layered protection offering solutions that protect and monitor at the perimeter, in the cloud down to the virtual machine, as well as the server front.

Specifically for the cloud and virtual use cases, Hillstone CloudHive leverages micro-segmentation for VMware networks along with CloudEdge, a virtual firewall appliance for networks that are virtualized or access via a cloud. In addition, the Hillstone portfolio of firewall solutions are now available for hybrid networks such as deployments with a mix of on-premises, cloud and virtualized environments.

Hillstone’s innovative security platform combines Behavioral Intelligence with high-performance networking, stopping threats within minutes, and protecting the network.

“The threat landscape is a dynamic and most sophisticated one, and it takes more than a point product to ensure the safety of businesses and critical assets,” said Tim Liu, CTO and Co-Founder, Hillstone Networks. “Hillstone’s vision has always been to be one step ahead of hackers and malignant threats by delivering technology that understands the characteristics and behavior of ever-morphing threats. With our behavioral analysis tools, our solutions quickly learn the behavior of new threats and adapt in order to protect.”

The 2017 Magic Quadrant for Enterprise Network Firewalls as well as the June 2017 Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) reports are available to Gartner clients at www.gartner.com.

About Gartner Magic Quadrant:

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

* Source: Gartner, Inc., “Magic Quadrant for Enterprise Network Firewalls” by, Adam Hils, Jeremy D’Hoinne, Rajpreet Kaur and Greg Young, July 2017


About Hillstone Networks, Inc.

Hillstone Networks’ Layered Threat Protection provides continuous threat defense at traditional perimeters, internal networks and their critical assets, down to each virtual machine. Established in 2006 by NetScreen, Cisco and Juniper executives, Hillstone Networks is relied on by more than 14,000 customers around the world, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks’ US headquarters is located in Sunnyvale, California. To learn more, visit www.hillstonenet.com.


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today. Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

SUNNYVALE, Calif.–(BUSINESS WIRE)–Hillstone Networks, a leading provider of network security solutions, announced today that Network Products Guide, industry’s leading technology research and advisory guide, has named Hillstone intelligent Next Generation Firewall (iNGFW) a Gold winner in the 12th Annual 2017 IT World Awards® in the Enterprise Network Firewall category, and Hillstone CloudHive a Gold winner in the Cloud Security category.

These industry and peer recognitions from Network Products Guide are the world’s premier information technology awards honoring achievements and recognitions in every facet of the IT industry. Winners from all over the world will be honored in San Francisco on Monday, June 26, 2017 during the 2017 SVUS Red Carpet Awards Ceremony Dinner in San Francisco.

Hillstone delivers Layered Security to protect businesses and their core assets. Hillstone’s intelligent Next Generation Firewall (iNGFW) provides continuous threat defense for today’s modern networks against sophisticated threats, through three differentiating technologies that work together for continuous monitoring and protection.

Hillstone CloudHive delivers security for virtualized datacenters. It provides micro-segmentation to secure each virtual machine (VM) in the cloud. It includes three virtual modules that work together as a single appliance to provide complete security to each VM and to stop lateral attacks between the VMs.

Looking at the threat landscape through these disparate lenses helps protect the network and its critical assets from multiple layers for a more comprehensive security posture. Learn more here.

An annual achievements and recognition awards program with active participation from a broad spectrum of industry voices, the coveted annual IT World Awards recognition program encompasses the world’s best in organizational performance, products and services, hot technologies, executives and management teams, successful deployments, product management and engineering, customer satisfaction, and public relations in every area of information technology.

“It’s an honor to be named a winner by IT World Awards,” said Lingling Zhang, VP, Product and Marketing. “Today’s network security issues are becoming ever more complex and sophisticated, as we see on the headlines daily, including the latest WannaCry incident. Businesses are looking for a holistic and layered security approach to protect their critical assets and network. Hillstone is poised to deliver on that, as validated by this recognition.”

About NPG’s IT World Awards

As industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision makers and end-users informed of the choices they can make in all areas of information technology. The Annual IT World Awards is part of the SVUS Awards® recognition program from Silicon Valley in the United States of America which also includes other programs such as CEO World Awards, Consumer World Awards, Customer Sales and Service World Awards, Golden Bridge Awards, Globee Fastest Growing Private Companies Awards, Info Security PG’s Global Excellence Awards, Pillar World Awards, PR World Awards, and Women World Awards. To learn more, visit www.networkproductsguide.com.

About Hillstone Networks, Inc.

Hillstone Networks’ Layered Threat Protection provides continuous threat defense at traditional perimeters, internal networks and their critical assets, down to each virtual machine. Established in 2006 by NetScreen, Cisco and Juniper executives, Hillstone Networks is relied on by more than 14,000 customers around the world, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks’ US headquarters is located in Sunnyvale, California. To learn more, visit www.hillstonenet.com.


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today. Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

Everett, Wash. – June 12, 2017 – Fluke Networks is bringing increased productivity and enhanced ROI to small cable installation jobs with the addition of the DSX-600 CableAnalyzer – an affordably priced entry-level copper certifier. Designed to provide essential Category 6A and Class EA copper certification, the DSX-600 increases the efficiency of small electrical contractors who install and test copper networks.

The Fluke Networks DSX-600 streamlines every aspect of the certification job – from setup, to testing and troubleshooting, to reporting results to the customer. It can perform Cat 6 and Class E certification tests in a speedy nine seconds and handles Cat 6A tests and Class EA in just ten, enabling installers to test hundreds of links every eight-hour shift. Furthermore, its extended battery life means that it can perform eight hours of tests on a single charge.

Thanks to its ProjX™ system, the DSX-600 helps manage job requirements and progress from set-up to systems acceptance, making sure that test setup is foolproof and that all tests are completed “right the first time.” Meanwhile, compatibility with the LinkWare™ Live cloud-based service means that contractors can manage certification jobs and testers from any smart device over Wi-Fi at any time and from any location. Since its launch in 2014, users have uploaded over four million test results to LinkWare Live. The DSX-600 also works with LinkWare™ PC, so contractors can create professional customer PDF reports quickly and easily.

The DSX-600 features a touchscreen user interface, allowing technicians to spend less time pushing buttons and more time testing.  Should a link fail, built-in troubleshooting analytics provide tools to help users identify the location of the failure.

“Now, even contractors who only test small copper installations can perform accurate and quality cable certification with the worldwide leader”, commented Thomas Roth, Senior Director of Marketing at Fluke Networks. “The DSX-600 provides essential certification backed by twenty-five years of cable testing history, thirteen worldwide service centers, and a support team who have authored over one thousand support articles.”

The DSX -600 is available in two versions – the base model that includes Channel Adapters and the DSX-600-Pro, which adds Permanent Link Adapters. The DSX-600 is backed by Fluke Networks’ worldwide support including service centers in 13 countries and training available in 50.

Availability – The Fluke Networks DSX-600 CableAnalyzer is available to order now from resellers of Fluke Networks’ products. For more information, please visit www.flukenetworks.com/DSX-600.

About Fluke Networks

Fluke Networks is the worldwide leader in certification, troubleshooting, and installation tools for professionals who install and maintain critical network cabling infrastructure.  From installing the most advanced data centers to restoring service in the worst weather, our combination of legendary reliability and unmatched performance ensure jobs are done efficiently. The company’s flagship products include the innovative LinkWare Live — the world’s first cloud-connected cable certification capability –introduced in late 2014


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today. Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

Bitrate, value added distributor of Network Monitoring and Security solutions in the Information Technology environment, is now representing Hillstone Networks in South Africa and Sub-Sahara Africa.

Hillstone Networks are recognized for their Intelligent Next Generation Firewalls and for their incredible performance on the NSS Labs Next Generation Firewall report. They achieved a NSS Labs recommended status with the best value per protected Mbps of all the tested Next Generation Firewalls.

“This value is what our customers are looking for in the market today” says Jeroen Dubbelman MD of Bitrate, “South Africa is experiencing very tough conditions economically and enterprises are constantly searching for a combination of quality and cost effectiveness.”

Hillstone Networks’s performance speaks for itself. The product line covers multiple facets of information security including Next Generation Firewalls, Intrusion Prevention Systems, Server Breach Detection, virtual firewalls for the edge and micro-segmentation. Hillstone Networks also covers both private and public cloud environments.

The solution set is mature with carrier grade quality and functionality. Hillstone Networks caters for the small to medium sized organisations, as well as large enterprises and Service Providers/Carriers with a comprehensive range of solutions.

“Hillstone Networks is awesome to see in action as it includes Abnormal Behavior Detection in its T-Series range that helps graphically map and understand the Kill Chain” says Dubbelman. “There is additional functionality like Link Load Balancing and Server Load Balancing which further increases the value of the solution”.

Hillstone Networks:

Today, enterprise network security professionals understand the importance of having comprehensive layered defenses. From direct monetary threats like ransomware where the lifeblood of the enterprise, its data and applications are being held hostage, to socially engineered threats including Phishing, Pretexting, Tailgating, Baiting and Quid Pro Quo, the goal of the attacker is essentially the same: to extract something of value from the network.

As threats and networks have become increasing more complex, defending against the expanded attack surface makes defense geometrically more complex. Hillstone‘s Layered Threat Protection is a portfolio of products that will help you keep your business more secure. Today, more than 14,000 enterprise networks worldwide rely on Hillstone solutions making it safer choice for your business.


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today.


Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

data-protection-1 (002)


CyberRiskAware is delighted to announce the latest addition to its user security awareness training library with the launch of a Data Protection course dedicated to enabling South African companies achieve compliance with the Protection of Personal Information (PoPi) Act 2013. The PoPi module increases our library to over 28 security topics for staff to enjoy and complements other regional Data Protection courses covering United States of America (HIPAA), United Kingdom (Data Protection Act) and Ireland (Data Protection Act and GDPR).

Other topics in our awareness library include password, email, social media, web security, social  engineering and public WIFI security.

All CyberRiskAware training content is designed with the user in mind and their busy schedules. Unlike all other content providers, we deliver “golden nugget” short, enjoyable and interactive content with videos never lasting more than 1 minute and courses less than 8 minutes.

data-protection-2 (002)

Versiv™ makes your team more productive, and for a limited time, you can double their productivity with a FREE FI-7000 FiberInspector™ Pro, consisting of a Versiv™main unit and fiber optic camera  Free


The FI-7000 FiberInspector™ Pro certifies fibre end-faces to the IEC 61300-3-35 industry standard in just one second, providing automated PASS/FAIL results that take the human subjectivity and guesswork out of fibre inspection.

• With all eligible configurations execute Basic/Tier 1 fibre certification and inspect fibre end faces at both ends of the link without moving the tester to the far end.
• In case a DSX-8000QOi is purchased: 1. Certify copper cabling and perform OTDR testing at the same time. 2. Perform Basic/Tier 1 fibre certification and simultaneously have the ability to either Extended/Tier 2 certify links or troubleshoot failed links with the OTDR.
Versiv saves you money every time you use it.


Field testing of screened cabling systems has always required that the tester verify that there is continuity of the screen to the remote end of the test, however some field testers can incorrectly report screen continuity and fail to highlight potential problems with the cabling system. This article discusses the issues with measurements of screen continuity, how it can influence other cabling test parameters and how the Fluke Networks shield integrity approach can correctly assure compliance of cabling installations according to the Level 2G requirements of TIA 1152A


“Category 8 will play a major role in data centers and mission-critical environments upgrading to 25/40GBASE-T, says Mark Dearing, Senior Product Manager at Leviton.

“Cabling manufacturers are now engineering solutions with additional quality and flexibility to meet these demanding new applications. But even the most advanced infrastructure relies on high-quality installation practices to ensure the network will operate at its best. Proper testing and certification in the field translates to less chance of disruption, downtime, and unforeseen costs in the future.”




Purchase now the special model number 1TG2-3000-BG1 and you will receive two OneTouch AT 3000 units in your order, for the price of 1. No rebate form required! Simply request this specific model number 1TG2-3000-BG1  make your IT budget go a little further.

Contact us today and we will contact you

CyberRiskAware CEO Stephen Burke: Some 95% of security incidents are caused by human error.

Taking a “prevention is better than cure” approach to cybersecurity, Dublin start-up CyberRiskAware is targeting global markets with technology designed to train company staff to identify malicious emails and other cyber threats.

“Some 95% of security incidents are caused by human error’,’ said company founder and CEO Stephen Burke, saying that human error mainly involves the opening by staff of phishing emails containing ransomware, malware and fraudulent requests for money transfers, known as CEO fraud.

“In the last year there has been a 250% increase in phishing scams. Recent figures show that 86% of all email phishing attacks contain ransomware and that 95% of all successful cyber attacks start from phishing.”

Observing the escalation of global cyber attacks, Mr Burke, while working as a chief information security officer for a global financial services company, decided there was a gap in the market for a company offering a proactive approach to cybersecurity.

He said: “There were products but these mostly involve a 40-minute training course which takes place once a year and is just a tick the box-compliance exercise. What is needed to reinforce the message is short and frequent training, with engaging and enjoyable content.”

Believing there was a need for a cybersecurity product which could deliver the right message to the right user at the right time, he set up CRA in January 2016.

Using his own funding, he recruited three other cybersecurity specialists as directors and set about building a minimum viable product. In April, CRA launched a mock phishing platform and an email security course.

“We made our first sale in June to a large UK/Irish retailer. Since then we have had additional sales in Africa and are awaiting the sign-off of several business cases in Ireland and the UK,” he said.

The mock phishing platform is designed to allow employers test employees response to cyber threat and to identify those in need of extra training.

It typically finds that 23% of employees open phishing emails and that 11% of them go on to open attachments or links. In addition, the company offers short training courses courses and videos covering 24 security topics as well as a security assessment quiz.

CRA has also added real time messaging, which according to Mr Burke, is unique to the company and sets it apart from its competitors. It operates by sending relevant messages when risky behaviour, such as using USB keys or downloading from the internet, is detected.

Mr Burke has signed channel partnership agreements with eight cybersecurity and insurance companies — including three in the US, four in the UK, and one in South Africa. Estimating the company platform already has in the region of 2,000 users, he says the plan for 2017 is to ramp up sales.

Revenue is earned from annual subscriptions based on usage and content. The core product is the mock phishing platform.

“We charge a minimum price of €25 per person for this based on a minimum of 100 users, with a lower charge for a higher number of users,’’ he said.

At the end of 2016, the company received €50,000 in competitive Start Funding from Enterprise Ireland which has been used to expand the company’s training range and its website. Identified as a high-potential start-up by Enterprise Ireland, CRA is now planning to embark on a significant funding round.

Mr Burke said: “We will apply for high- potential start-up funding and will also be looking for private funding. Our aim is to raise between €750,000 and €2m this year.”

The funding is needed to market the company internationally and to develop the team. CRA plans to take on at least six staff and aim to achieve a turnover of €1m. It then aims to double that in 2018.

With cyber attacks now estimated to cost €2.85tn a year, he believes there is huge scope for CRA’s e-learning platform.

FNET Field Agent XU49, we have new assignment for you. Proceed with this communique only if you can handle significant advantages.

25th Ann
Your mission
On 23rd of January 2017, at exactly 16.00 hrs. Central European time, you will log onto a special – super secret – webinar. One that has been created to give the casual observer the appearance of an ordinary Fluke Networks 25th Anniversary Global Celebration. Indeed, you may also think of it as ordinary – just like any other Fluke Networks 25th Anniversary Global Webinar. But you will know that this is just a facade, and you will know how to take advantage.

Indeed, it was just 25 years ago that Fluke Networks was first brought into existence. Now your time has come. You will log on to the special Fluke Networks 25 Anniversary Global Webinar using the special code words and pass algorithms detailed below.

First part of your mission: As one of our important agents in the field, you will want to know what we will communicate to the more than 500 network installation professionals that we will address with special announcements, so make sure you are there!
Second part of your mission: You yourself also know a lot of network installation professionals – your second part of the mission is to communicate our message to as many of them as you deem fit to hear it as well (we know you know best who to select). For this, we will allow you to use attached message that will also be sent by HQ.

You will witness how Fluke Networks intends to mark this important milestone and how that marking will dramatically affect the network installation business in the future.

You will then use this knowledge to increase your profitability as important agent in the Field.

Good luck, and look good.

Register for webinar


AirCheck G2 allows frontline technicians to resolve 802.11ac problems quickly and efficiently

 WESTFORD, Mass. — May 17, 2016 — NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a market leader in service assurance and cybersecurity solutions, today launched the next generation of the AirCheck™ Handheld Wireless Tester. This industry-leading tool is available through NETSCOUT’s recently launched CONNECT360 global channel partner program, and includes important new enhancements, such as troubleshooting and diagnosing WiFi networks built using the increasingly adopted 802.11ac standard, access point backhaul testing, and free access to the Link-Live™ Cloud dashboard for more effective results management.

“NETSCOUT is very excited to be releasing the AirCheck G2, which arms technicians with easy-to-understand insights to 802.11ac wireless networks that help reduce costly escalations,” stated Michael Szabados, chief operating officer for NETSCOUT. “The AirCheck G2 sports a sleek new look designed with the same quality engineering our customers and the marketplace have come to trust. NETSCOUT is a firm believer that wireless network edge technologies, such as 802.11ac, will play a pivotal role in the evolution of the Internet of Things (IoT) and other industries that require ubiquitous reach and mobility. NETSCOUT’s value proposition has been anchored around helping customers gain the real-time operational intelligence and insight necessary to ensure a high-quality end-user experience, and this new tool embodies this focus by providing front-line technicians with the capability to effectively troubleshoot issues that can impact WiFi network performance.”

New AirCheck G2 enhancements include:

  • 11ac 3×3 radio to support next-generation wireless initiatives
  • Link-Live integration for collaboration, reporting and results management
  • 5” touchscreen display for improved ease-of-use
  • Ethernet tests for AP backhaul verification

“NETSCOUT has clearly hit a home-run with the AirCheck G2. Not only is it a perfect replacement for the venerable generation one AirCheck, it comes packed with features that will make it the triage tool of choice for WiFi professionals everywhere. In addition to the 802.11ac and touch screen functionality, NETSCOUT raised the bar by integrating wired testing directly into the unit – a must have for not only RF Designers but Access Point installers,” explained Sam Clements, mobility practice manager at Presidio, a leading US-based IT solutions provider offering consulting, professional services, and cloud and managed services. “Couple the new features with Cloud integration and it’s the perfect tool for a distributed nationwide team, or a tactical one-on-one engagement. The ‘at a touch’ insight that the AirCheck G2 brings to our team throughout all cycles of lifecycle management makes it an invaluable asset to all levels of WiFi admins, engineers, and designers.”

“The 802.11ac standard is fast becoming the industry preference with adoption rates in 2015 reaching 54.5% of dependent access point unit shipments and 71.3% of dependent access point revenues,” said Nolan Greene, research analyst, Network Infrastructure at IDC. “As enterprise mobility becomes ubiquitous and IoT applications move into the mainstream, there will be increased demand on enterprise WLANs. The NETSCOUT AirCheck G2 Handheld Wireless Tester’s strong, industry-leading capabilities around the 802.11ac standard will be absolutely critical in supporting next-generation wireless initiatives.”



NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world. To learn more, visit www.netscout.com.

©2016 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, the NETSCOUT logo, Guardians of the Connected World, Adaptive Service Intelligence, AirCheck, Link-Live, LinkRunner, LinkSprinter, nGenius, nGeniusONE are registered trademarks or trademarks of NETSCOUT SYSTEMS, INC., and/or its subsidiaries and/or affiliates in the USA and/or other countries. Third-party trademarks mentioned are the property of their respective owners.

Khipu Networks, global provider of Cyber Security Solutions across, and Bitrate, distributor of cutting-edge network technologies, today announce their partnership in providing secure network access control through their partnership with Bradford Networks.

Working together with existing customers and enterprise prospects, the partnership ensures that the strength of networks across South Africa increases exponentially by providing a flexible, versatile solution that provides the ability to have complete visibility of one’s network. With the increased number of devices, including laptops, tablets and smartphones that need to be centrally-managed on networks across the country, automation and visibility of what is happening on existing networks is imperative in providing a safe, secure network for both organisations and end-users alike.

Working in partnership with Bradford Networks, Khipu Networks and Bitrate will be able to provide a network access control solution for both wired and wireless access that is able to:

  • Support all types of devices (desktop, mobile, IoT) connecting to the network
  • Little or no network re-design
  • Not be reliant on a particular wired or wireless vendor
  • Utilise a proven out-of-band architecture that scales and does not require server in each location
  • Automate registration and onboarding
  • Enforce security policies for use cases ranging from network access control to endpoint containment

‘The key to this partnership, as we see it, is Network Sentry’s ability to complement some of our existing security products. The integration, for example, with Palo Alto Networks Next-Generation firewalls, makes the NAC solution all that much more valuable.’ – Jeroen Dubbleman, Managing Director, Bitrate

For years Bradford Networks has been working on providing Network Access solutions around the world to various large scale networks with key accounts in the USA, Europe, Asia and now Africa. With ransomware, phishing attacks and malware running wild across the globe, the launch of this partnership could not have come at a better time in South Africa as banks, government departments, universities, schools and even retailers are actively in the crosshairs of cyber criminals.

‘As a Network Security company, what we strive for is giving our customers visibility, access and control of their networks, by partnering with Bitrate, we feel that we are able to offer this to a wider scope of customers across South Africa and hopefully Africa.’ – Matt Ashman, Director, Khipu Networks

Network Sentry is the first network security offering that automatically identifies and profiles all devices and all users on a network, providing complete visibility and control. The solution provides automatic registration of the user’s device(s) the first time they connect to the network. If the user / device is valid, the system then enforces an Acceptable Use Policy (AUP) and security compliance check including ensuring that virus and spyware protection is present and up-to-date. Devices without the proper security settings are remediated with simple instructions to ‘self-fix’ their device before being granted network access. The mobile devices are then able to roam the network without having to re-register.

‘We are beyond excited about our expanding Network Sentry into South Africa, we have had a long standing relationship with Khipu Networks and to now have Bitrate on board can only bode well for the security of networks across South Africa.’ – Gary Mead, International Sales, Bradford Networks

For more information, contact http://www.khipu-networks.com/

About Bitrate

Bitrate was founded in 1999 and is focused on the supply of network analysis, data centre infrastructure, information technology security and maintenance equipment. The company is currently the official supplier of the Fluke Networks range of test tools, Palo Alto Networks. Visit http://www.bitrate.co.za/ to learn more.

Partnership Delivers Next Generation Data Center Solution to Help Customers Respond to Real-Time Needs with Efficiency and Operational Simplicity

South Africa — May 23, 2016 — Bitrate, a leading supplier of network analysis, infrastructure, security and maintenance equipment in South Africa, today announced a partnership with Stratoscale, the software company revolutionizing the data center, to deliver comprehensive, flexible and scalable data center cloud solutions to its customers.


Stratoscale’s 360 degrees partner program, PartnerFirst, was created with an all-inclusive approach to maximize partner’s technology, products and services with the goal of bringing mutual benefits to customers and partners. By partnering with Stratoscale, Bitrate is bringing the simplicity of the public cloud into the enterprise data center, providing an experience and capabilities that are scalable, expandable and affordable.


“With Stratoscale’s hardware-agnostic SDDC solution, we are able to add value to our customers by providing innovative cloud solutions, and create a competitive advantage for our partners,” said Jeroen Dubbelman MD of Bitrate. “Our partnership with Stratoscale enables us to offer a solution that will meet the business needs of our customers and scale as their business grows.”


Stratoscale has brought the control back to IT by providing unparalleled private cloud capabilities in the data center in a way that’s faster and simpler than legacy infrastructure, and doesn’t require specific expertise or expensive services. Offered through its channel partners, Stratoscale’s hardware-agnostic, easy-to-use software platform, Stratoscale Symphony, delivers cloud-scale economics to data centers of all sizes with efficiency and operational simplicity.


“Through our PartnerFirst program, Stratoscale is building an ecosystem of technology and distribution partners, as well as expanding coverage and customer service to meet market demand for next generation data centers,” said Ariel Maislos, CEO of Stratoscale. “We are excited to be working with Bitrate to help them grow their business by having a best-in-class product to offer existing customers. Not only does our PartnerFirst program offer innovation in technology, sales and marketing support but it ensures our partners’ success in their go to market plan.”


About Bitrate

Bitrate was founded in 1999 and is focused on the supply of network analysis, data centre infrastructure, information technology security and maintenance equipment. The company is currently the official supplier of the Fluke Networks range of test tools, Palo Alto Networks, Netscout, Airmagnet, Falcongaze, Luxartech  and the EfficientIP range of Core Network Services Equipment. Training in the effective use of the tools is key in order provide full customer satisfaction. It is vital so that the customer enjoys the full benefits of their investment in the products. The equipment we supply must constantly evolve and adapt to the latest networking environment. We at Bitrate know that in order to remain a leader in the field we need to supply the best the industry has to offer, therefore we constantly search for the best solutions for our customers. For more information, visit http://www.bitrate.co.za/.


About Stratoscale

Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere, IT is empowered to take control of their data centers. Stratoscale is offering a hyperconverged cloud supporting OpenStack out of the box. Led by an experienced management team that brings a proven track record in the field of startups, Stratoscale was named a “Cool Vendor in Servers and Virtualization” by Gartner. Stratoscale is backed by leading investors including: Battery Ventures, Bessemer Venture Partners, Cisco, Intel, Qualcomm Ventures and SanDisk. For more information, visit http://www.stratoscale.com.


infoGraphics - PR-Messengers

Today messengers rightfully occupy a worthy place among the most used office software and tools for business communication. Every company determines what software should be used by staff to keep in touch with colleagues, partners and customers, and sometimes allows employees to make these choices on their own. In addition to user-friendliness,today, when video cameras, wireless mice, fitness trackers, smart cars and even toilets can be easily hacked, the security of communication tools comes to the fore.

Analytics Center of Falcongaze, a vendor of software solutions in the field of data leak prevention via various channels (email,social networks, instant messengers, USB devices, etc.), has made a rating of the most popular instant messengers, grounding on their level of security.

The rating was based on two criteria: the popularity of messengers among users and their security. Security,in turn, was evaluated by two main factors: if the protocol open or closed and whether end-to-end encryption is implemented (when encrypted data are transmitted from one device to another directly, without intermediaries). In addition, information about vulnerabilities in instant messengers, obtained from public sources, was taken into account as well.

Yahoo! Messenger with all the bells and whistles of popular instant messengers closes the top ten. The protocol, as well as the code of Messenger,is not open, users do not have an opportunity to verify contacts’ identities,there is no end-to-end encryption. However, the experts of Falcongaze Analytics Center give credit to the Yahoo! Messenger developers for fixing security vulnerabilities and assign the tenth position to the messenger.

A popular application (100 Million daily active users), which is more known for its photo and video messages than standard text chats – Snap chat – occupies the ninth position in the Falcongaze’s rating. It is an instant messaging application that allows users to send self-deleting messages to one another. Snapchat’s code is closed. As for encryption, all the messages are encrypted in transit. To encrypt the information exchanged between users Snapchat uses the same key for every message, which does not provide full security. In addition, Snapchat has gone through major cyber security challenges since 2011, for example in 2014 personal credentials of 4.6 million U.S. Snapchat users, such as phone numbers and usernames, were made public on a website.

However,the vendor of Snapchat took measures to eliminate security vulnerabilities, introduced two-factor authentication and initiated reporting about its transparency. Moreover, Snapchat initiated a bug bounty program that encourages researchers to find and report security vulnerabilities in the application. In addition, it has recently been reported that Snapchat is currently working on stronger encryption technology,so it has a good chance of occupying a higher position in the rating of Falcongaze in the future.

Messenger of social network, which is among the five most visited web sites in the world – Facebook Messenger – is located just above. This messenger does not provide end-to-end encryption when only the people communicating can read the messages. In addition, Facebook Messenger previously appeared in the center of the scandal since during the installation it requested permission to use the microphone on a user’s device to record audio at any time and without their confirmation. If a user inadvertently gave permission to do so, the messenger had the opportunity to not only record audio, but also take photos and video sat any time and without confirmation from a user. This mobile messenger ranks eighth in the list.

Simple enough to use Google Hangouts encrypts all the information, including video conferences. However, as in the case of the messenger, which took the eighth place in the list, the data are encrypted only when transmitted from a device to the developer’s server and from the server to the user’s interlocutors. That means that when they get to the server, there are no security guarantees. This encryption is called in transit and does not protect conversations of Hangouts followers from falling into the hands of third parties. The seventh position gets the messenger of Google company.


BlackBerry Messenger (BBM) is an instant messaging app that allows users to exchange text messages, make voice calls, photo, file and location sharing. It has no end-to-end encryption, users have no opportunity to verify contacts’ identities and the code is not open-source.

Nevertheless, it must be mentioned that in the beginning of April 2016, BlackBerry announced that some key BBM privacy features would become free for all users. After the update users will be able to use Retract, which allows them to delete a message from both the sender and recipient, and Timer, which set limits on how long a message or photo can be viewed, for free. What is more, the message editing and Private Chat, a feature that removes names and avatars from the chat window, will become available at all platforms. BlackBerry Messenger occupies the sixth position in the rating of Falcongaze’s experts.

Good old Skype, which has been used for years by both individual and corporate users due to its convenience and vast possibilities, actually turns out to be not so good. The protocol of this messenger is closed, so it is difficult to assess security measures laid down by developers, and encryption used in Skype does not provide adequate protection. Once in 2011 Skype was bought by Microsoft,the fact that the security services have access to the correspondence of users,is not especially withheld. For high user loyalty and the presence of encryption Skype is awarded with the fifth place.


At “LINE Conference Tokyo 2016″ the developers of LINE,which is one of the most popular messengers, especially in Asia, announced the app had grown into a global service surpassing 1 billion users and achieving an MAU (Monthly Average Users) of 215 million. Security is not an empty word for LINE: in 2015 end-to-end encryption was deployed, which is turned on in the settings page called “Letter Sealing”. LINE plans to switch it on byde fault for all users, initially it is only default for those with one Android device registered to their account. There are also plans to add encrypted sealing to Line for desktop and other operating systems over time. LINE tread son the heels of the top three and is ranked fourth.


Fast favorite with users Viber took the third spot of the charts.Within a short period the development of Viber Media company was able to win glory of the immense number of people: now the number of users has exceeded half a million and is moving steadily to around a billion. The messenger’s protocolis closed. However, it has recently become known that end-to-end encryption of communications, voice calls, photos and videos, will be deployed into the new version of Viber. What is more, there also will appear private chats in Viber, like those that have already been implemented in Telegram, to which we will address later. Access to the hidden correspondence of these chats will be available after entering the PIN-code, and iOS users will be able to get authorization by fingerprint. So far, end-to-end encryption, according to the developer, is available in a limited number of countries, and after successful testing in the nearest future it will become available for all users. Therefore, Viber takes the third place on the pedestal of the most secure popular instant messengers.


Silver medal in the rating of messengers by Falcongaze gets WhatsApp. This messenger gained popularity long ago – the number of WhatsApp users stepped over one billion. Protocol oft he IM is open, and since 2014 WhatsApp supports end-to-end encryption for Android devices. However, in early April 2016 the company Open Whisper Systems announced the introduction of complete end-to-end encryption in WhatsApp for all platforms. Now the messenger encrypts absolutely all data transmitted by users,and even WhatsApp employees wouldn’t be able to decrypt them. The second place goes to WhatsApp.


The rating of the most secure popular messengers is headed by rapidly gaining users Telegram. As of February 2016 the number of active users of relatively recently appeared messenger was more than 100 million people. Source code, protocol and API in Telegram are open, and to provide security of user correspondence strong encryption is implemented. Both regular and secret chats are available.In regular chats client-server encryption is used, while secret chats use end-to-end encryption. Secret chats also support self-destructing messages, and Self-Destruct Timer can be set to the desired time limit. As soon as the time runs out, the message disappears from both devices. A secret chat with a particular user can only be accessed on the device of origin, and messages from secret chats cannot be forwarded. In addition, each user can set a password to log into their account or set up authentication by fingerprint. Telegram promised to pay a reward of $ 300,000 for hacking the correspondence of the two bots and extracting a secret email address from a secret chat between the bots. The experts of Falcongaze reward telegram with the first place in the rating of the most secure popular messengers.

The adoption of an Information Security Policy is an obvious step for companies who care about their own well-being, it’s an integral part of governance to ensure the protection of business. Falcongaze Analytics Center highlights what it means and why it is essential.

An Information Security Policy outlines the main principles and general concept for the setting up information security at a particular organization. It should reflect the organizations goals for security and the approved strategy for securing data. When viewed in the narrow context, an Information Security Policy describes and regulates all business processes in terms of their security.

Why do you need an Information Security Policy?

The main objective of an information security policy is to enter in the record the information security rules within the organization. Without it, the interaction of employees with a variety of resources will be regulated only informally and therefore the risk of breaches and data leaks will increase. The introduction of the corporate policy will raise the discipline and consciousness of employees and build a foundation based on which you can efficiently organize the work of the company.

When developing a corporate security policy you should start by determining risks that threaten the company. This means first of all to specify what information assets must be protected, to which threats those assets are subjected, and what damage the company faces in the case of experiencing these threats.

The process of introducing protective measures is always a search for a compromise between comfort and risk mitigation. The implementation of an Information Security Policy is an act of formalization of this compromise. The adoption of an Information Security Policy will help to minimize situations in which an average user does not take the recommendations of the Information Security department seriously, or information security officers try to protect everyone from everything, disrupting business performance of the company.

What an Information Security Policy should contain

Security must be ensured at all levels, so an Information Security Policy should address all systems, networks, data, software and, of course, users. For example, you compile the list of servers and the list of employees who have access to them, define tasks and responsibilities. Even more important in the development of security regulations is the security policy of workplaces, in particular the policy of working with Web Resources. It regulates the responsibility and duties of employees in terms of working on the Internet or within the organizations network.

All the information should be classified. There should be no ambiguity in the terminology. There also should be references to supporting documents (e.g. guidelines, procedures, technology standards, etc.).

In addition, an Information Security Policy should include all the measures, which the company uses to monitor compliance with the policies, and specify consequences for non-compliance. Transparency is a must both in creating an Information Security Policy and familiarization of employees with it.

Monitoring of compliance with an Information Security Policy

There are various methods of compliance control. Diverse software designed to monitor the activities of employees in the workplace is available both separately and as part of comprehensive products. Such security platforms as Falcongaze SecureTower, in addition to their primary function of data leak prevention, allows one to monitor the activities of employees and identify all violations.

The introduction of an Information Security Policy is not a one-time event, but a long-term process, which should involve the representatives of IS- and IT departments, as well as heads of other departments, so that all factors would be taken into consideration. One of the main goal




Tailored industry relevant information for
Network Professionals to keep you updated about the latest industry and job
related trends.

> Upcoming Events and Resources

> Datacom Cabling News


Exhibitions and Events

CCTT Training-Certified Cabling Test Technician
Program. Two-day training and certification program that will not only
improve installer skills, but also the effectiveness and productivity on the
job. Esharp training centre at 209, Al Qusais Plaza, Damascus Street,
Qusais, Dubai

9/10 March & 16/17 March    
From 9am till
More Information


  All the latest resources

>  Versiv kit configurator English

> Versiv kit configurator French


Dumb Thing #10: Skipping Out on Proper Fiber

While the smart people who install, test and certify
network cabling plants know the importance of meeting standards performance
parameters and ensuring application support, even the best of us can make
mistakes that adversely impact the bottom line and customer satisfaction.

Let’s take a look at the #10 Dumb Thing that smart
people do when testing network cabling systems—skipping out on proper fiber

Get the Warranty the First Time Around

Virtually all of your customers are going to want the
system warranty offered by their cabling manufacturer. It also lowers risk
for architects, consultants and engineers by proving that the system meets
the intended performance to support the customer’s applications, while
helping to avoid finger pointing and callbacks that are every contractor’s
worst nightmare. A system warranty is essentially your best insurance
policy.

Get the New Fiber Certification Poster for FREE       
Request now >>

Best Practices for Cleaning Up Your Fiber

While it seems we can’t drive the point home enough
that the number one cause of fiber network issues and failures is
contaminated connectors, we hope by now that all fiber technicians at least
know that they are SUPPOSED to clean and inspect every fiber end face before
making that final connection. But are you cleaning those fiber end faces
correctly? Let’s take a look at some best practices.

Read More >>

Get the Cable Testing Certification Standards poster for FREE  Request now >>

Dumb Thing #9: Relying on a Duplex Tester for Certifying MPO Trunks

While the smart people who install, test and certify
network cabling plants know the importance of meeting standards performance
parameters and ensuring application support, even the best of us can make
mistakes that adversely impact the bottom line and customer satisfaction.

Let’s take a look at the #9
Dumb Thing that smart people do when testing network cabling systems—relying
on a duplex tester for certifying MPO trunks.

Be in the Loop about Smarter Bidirectiona Testing  When it comes to  Tier 2 testing using an OTDR, measuring the loss of specific events like connectors and splices, as well as overall link loss, depends on the direction in which the measurement is made.  

  Read More >> 

Building a smart and effective information security infrastructure is quite a challenging task many companies cannot embrace to the full extent, which results in gaps in corporate security. You have installed an antivirus – and an employee has opened a link in a phishing email. You have set up a firewall – and a disloyal employee has emailed your Business Plan to competitors. You have implemented a DLP system – and a DDoS attack has shut your web services down. Because of the diversity of threats, companies need a comprehensive approach to the protection of information resources. Falcongaze Analytics Center compiled a list of preventive measures that will help to minimize risks, prevent leaks of confidential information and ensure the safety of business.

 Document Management

A well-organized system of information storage and document management is an important, though often overlooked component of building information security infrastructure. Companies often do not have firm knowledge of where exactly their sensitive information resides on the network. The main objective in this situation is to gain knowledge about the location of sensitive information, its structure and access rights. It is pointless to try to protect a vague set of documents – all data should be classified and structured. These tasks are covered by various enterprise project management and DMS products. In cases, when operational convenience involves remote workforce, access to confidential data and corporate resources can be established over the Internet. The volumes of data in these situations should be minimized and the employees should connect to the resources over secure channels.

 Access Rights Management

Every company is subdivided into divisions or departments, which have various levels of responsibility and competence. The bigger a company, the higher staff diversity, the more complicated corporate structure. Growth often comes with new divisions, remote offices and regional branches. It is quite obvious that each user group requires its own level of access rights, especially when dealing with confidential information. Bank accounts info and contract details are within the Accounting Department professional competence, and IT division has nothing to do with this data for sure. Accounting officers should be definitely kept away from servers and development resources. To ensure such an approach there is diverse identity management functionality available, and most of the corporate systems allow creating group policies.

Some information security products, like SecureTower by Falcongaze, provide division managers with access to information on their staff only; information security officers have access to security incidents only and cannot browse through user activities; information on financial documents, transmitted by accounting officers, can be available to the CEO solely. All components of corporate infrastructure should be tuned in a similar way: configuration of various prohibition levels on firewalls, access to documents can be easily configured in all major project management solutions, physical access is covered by access control and management systems.

This paper highlights the silo approach in which organizations tend to focus on a single issue within different groups, even if there may be huge implications across the entire organization ranging from the end user to the CEO. The performance management approach brings these disparate issues, views and groups together and focuses on providing a holistic view to improving overall performance of critical resources, applications and staff. This document will focus on key attributes and best practices for organizations looking to successfully deploy performance management strategy across their enterprise.


The IT network is at the heart of most enterprises, supporting business-critical applications, providing the data on which business decisions are made and facilitating communications with customers, partners, suppliers and co-workers. More than ever before, it is a strategic asset to the business, and any downtime or degradation in network or application performance will directly impact the organisation’s bottom line.

Proactively improve and Optimise Performance

To deliver the service levels agreed with the business, the challenge is two-fold: proactively improve and optimise performance to ensure that the network delivers what users require, and resolve any problems that arise as quickly as possible to minimise downtime. This White Paper looks at methodology of solving network and application performance issues and outlines a new approach to getting to root cause more quickly.



Cooperation between Falcongaze and Bitrate has reached a new level. The companies announce the launch of a new joint campaign: any compliance-minded company, which deals with personal data and sensitive information, can receive a free tool to make all data transfers, business communications and the level of corporate loyalty transparent and available for analysis and reporting.

The threat of critical information loss is growing day-by-day. Sometimes when there is no reliable protection against internal threats, confidential corporate data may fall into the hands of third parties, while a business may not have a clue about this. This happened to retail brokerage Scottrade which had suffered a leak of information affecting 4.6 million customers between late 2013 and early 2014.  It has become known only now, when federal authorities have notified Scottrade of this data breach.

The situation around such companies is constantly heating up: if a business is instantly aware of a leak and is able to make prompt investigation is one thing, but when a company finds out about a leak after a long period, it is a more serious issue with a long-term chain of painful consequences. Leaks of contact details, home and e-mail addresses, social security numbers of customers and partners, as well as commercial information about products, developments, financial reports and business plans turn out to be a disaster, which entails huge economic and reputational losses.

If businesses are not able to organize comprehensive information security system and thereby protect their own resources, how can they claim their trust of customers, partners and investors? Transparency is the key to successful management of corporate information and business environment.

However, the challenge is accepted, and Falcongaze, the vendor of integrated solutions for data loss prevention as well as optimization of work processes and protection of business against internal threats, in partnership with Bitrate announces the Information Security Action promo. Every company interested in getting a holistic view on sensitive information management, data travel and business communications within the corporate network can receive a full-featured version of Information Security and Operational Risks Management platform SecureTower. This is backed by technical support and assistance in deployment absolutely free of charge with no further obligations. All businesses interested in the Information Security Action promo are welcome to contact Bitrate for more information.

The campaign involves 30 days of SecureTower and related services at full disposal and is valid until February 1, 2016.

Bitrate is glad to announce one of Falcongaze’s latest threat detection

Reports about security incidents have become as common as weather forecasts. At the same time, there is a clear trend concerning the fact that the number of incidents involving employees is constantly growing. Insiders can cause much more serious damage than intruders outside the company can, just because they have much more opportunities to gain access to confidential data. The effects of such incidents, when sensitive information leaks to third parties, include financial losses, up to loss of intellectual property and business itself, reputational harm and loss of customer confidence. Growing popularity of social media also contributes much to security incidents – they provide lots of opportunities for criminals to find insiders and use them to access critical data, not to mention the fact that an employee may simply post some confidential information on their Twitter or Facebook account.

At the same time, according to the annual Verizon 2015 Data Breach Investigations Report, the reason for 55% of incidents was so-called privilege abuse, when the main source of information leakage were employees in whom a company had placed trust and who were given access to important corporate data with the expectation that these data will be used for the intended purpose only. Unfortunately, insiders, who are not controlled by security systems implemented into corporate network, tend to abuse the trust placed in them. Such employees have become the most cited perpetrators of cybercrime. Insider threats are more damaging and costly than incidents committed by outsiders. Yet many companies do not pay enough attention to the problem, do not have necessary security policies and tools to control privileged insiders, and are therefore not prepared to prevent, detect and manage incidents caused by them.

In fact, practice when activities of trusted employees (unlike the activities of their colleagues) are not monitored via security software turns out to lead to incidents when these employees sell confidential data to competitors, use it for their own interests, or, in the end of the day, harm the organization unwittingly, inadvertently sending sensitive info to the wrong email.

The problem also lies in the fact that most of modern conventional DLP software products are customized so that they do not actually analyze the activities, content and recipients of information transferred by employees who are trusted by their company. While information security and protection against internal threats software, such as Falcongaze SecureTower, solves this problem hitting right in the bull’s eye.

SecureTower captures and analyzes network traffic including e-mails with attachments, conversations and calls in IM, posts in social media, uploads and downloads from cloud storages, documents sent to USB devices and much more. All intercepted traffic and user activity data (records of user working time, the exact time spent by users on each website, applications launch and time of their active use and other indications of job contribution) are saved to a database, which makes it possible to investigate any incident in retrospective. Comprehensive information security system SecureTower allows to analyze corporate business processes and identify patterns that indicate a violation of the security policy, even if it is committed by an employee whose work with sensitive info is a part of everyday activity.

Use of SecureTower helps to protect a company from internal threats and give a confidence in its employees and in the future. After all, the proverb First try and then trust fits best for businesses of every kind.

Evaluation Based on Completeness of Vision and Ability to Execute

SAN JOSE, CALIF.– Nutanix, the next-generation enterprise computing company, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the “Magic Quadrant for Integrated Systems.” Nutanix believes this positioning is strong validation of its vision to make data center infrastructure invisible so IT professionals can focus on the applications and services that power their businesses.


Today, most business applications run on traditional data center infrastructure comprised of individual silos of server, storage and networking resources that are managed separately and scaled independently. These non-integrated architectures have increased data center complexity and slowed the overall pace of IT innovation.


The Nutanix Xtreme Computing Platform natively integrates compute, storage and virtualization into a Hyperconverged Integrated System that can run nearly any enterprise application, at any scale. Based on the principles of web-scale engineering and consumer-grade design, the Nutanix platform delivers uncompromising simplicity to data center managers so they can become true strategic partners to the business.


“Companies need to re-focus on the applications that drive their business, not the intricacies of the underlying infrastructure that powers those applications,” said Dheeraj Pandey, co-founder and CEO, Nutanix. “We consider our positioning in the Leaders Quadrant by Gartner confirmation of our unique vision for how the data center will evolve over the next several years, bringing cloud-like scalability, resiliency and agility that makes the infrastructure invisible to the business, and enables IT leaders to deliver real innovation to the organization.”


For more information on Nutanix and its commitment to providing customers with flexibility and choice within their data center infrastructure, please visit: http://go.nutanix.com/2015-gartner-magic-quadrant-integrated-systems.html


Gartner, Magic Quadrant for Integrated Systems, Andrew Butler, George J. Weiss, Philip Dawson, Stanley Zaffos, Errol Rasit, Hiroko Aoyama, 11 August 2015


Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


About Nutanix

Nutanix delivers invisible infrastructure for next-generation enterprise computing, elevating IT to focus on the applications and services that power their business. The company’s software-driven Xtreme Computing Platform natively converges compute, virtualization and storage into a single solution to drive simplicity in the datacenter. Using Nutanix, customers benefit from predictable performance, linear scalability and cloud-like infrastructure consumption. Learn more at www.nutanix.com or follow up on Twitter @nutanix.

About Bitrate

Through innovative products and technology, Bitrate provides solutions to the ICT industry focusing on Data centre infrastructure, IT monitoring, IT management and IT security. Bitrate distributes throughout Sub Sahara Africa. More information can be found by visiting the Bitrate Web site at www.bitrate.co.za

Eye On Networks July Edition
Welcome to the July edition of Eye On Networks. Here you will find industry relevant information for Network Professionals, with a goal of keeping you informed about industry and job related trends.  Let us know what you think by shooting us an email at flukenetworksinfo@flukenetworks.com
Upcoming Events, Webcasts and White papers
Events  - 30 July |  Versiv training Program |Networks Centre Training Academy, Horsham, West Sussex, UK  | 9am – 4.30pm | Register Now: +44 (0) 1403 754233+44 (0) 1403 754233
Recorded Webinars- How to obtain relevant and credible fiber test results| View Now
– Site Survey Best Practices| View Now
– Six Worst Network Troubleshooting Issues and How to Get Past Them| View Now
– Four Ways to Simplify Network Connectivity Testing and Documentation| View Now
– Network Troubleshooting: It’s more than packet capture| View Now
– The Structured Approach to Network Problem Solving| View Now
See Live Demo of OptiView XG|
View Now White Papers Fiber Standard-Compliant Certification| View Now
– Encircled Flux: An Insider’s Perspective” reprint| View Now
Reducing Costs Through More Effective Results Management| View Now
Cutting through the fog:The Need for Real-Time SaaS Visibility and Monitoring| View Now
Best Practices for Troubleshooting Remote Site Networks| View Now
How IT Can Take Control of the Borderless Enterprise| View Now

Resource Center:

- Versiv kit configurator More Info
– LinkWare live videos More Info
The CIO Brief:  A resource of brief insights focused on new approaches and technologies More Info 
– Gartner |  More Info
–  Network and Application Resource Center More Info

Datacom cabling
DTX-1800 Production Ends June 30th
The response to the new DSX-5000 and the Versiv family of products has been very strong since its launch in 2013. So much so, Fluke Networks will be ending production of the DTX-1800 on June 30th.. Read more
New Gold Membership Benefit: Lifetime Buyback Guarantee
Fluke Networks has a new Gold program benefit for copper and fiber datacom Gold customers – the Lifetime Buyback Guarantee.. Read more
Copper Certification Testing Best Practices Pocket Guide
The Copper Certification Testing Best Practices pocket guide was designed by Fluke Networks to help you maximize profitability whilst ensuring manufacturer warranty statements are promptly issued…Read more
IT Networking
Great Network Tools Aren’t Free… but Neither is Downtime
Network and application problems cost companies a ridiculous amount of time and money, and if they go unresolved, customer loyalty, brand reputation and public perception suffer..Read More
Politics, money, and network performance
If securing sufficient budget to support your IT organization feels like you’re maneuvering through a political mine field, it’s because you are..Read More 
Announcing TruView Live
More than 75% of Fortune 500 companies have begun to incorporate cloud-based services and SaaS applications into their day-to-day operations , some of them performing business-critical functionsRead More 
WLAN Analysis
Avoiding Honeypot APs: Who do you trust?
While rigorously validating server certificates is key to avoiding Honeypot APs and other man-in-the-middle attacks that may follow, this advice begs the question: How do you know which servers to trust?… Read more
Can WPA2-Enterprise stop Honeypot AP attacks?
Numerous demonstrations have proven that users easily fall prey to open Honeypot (aka Evil Twin) APs. … Read more
4 5 6
2 3


End-face contamination is a leading cause of fiber failures in data center, campus and other enterprise or telecom networking environments. See how easy fiber inspection becomes with the IEC 61300-3-35 compliant Fiber Inspector from Fluke Networks.

As the industry moves to higher data speeds, more stringent loss budgets and new multi-fiber connectors, proactively inspecting and cleaning fiber end-faces is more important than ever to ensure network uptime, performance and equipment reliability. However, relying on subjective human inspection of fiber end-faces often produces inconsistent results.

Here is a list of the various ways fiber networks can become contaminated:

  • Accidently touching a fiber end-face
  • Dirty, dusty construction environments
  • Brushing an end-face on clothing (can contain body oils, lint or other substances)
  • Dust in the air
  • Contamination also easily migrates from one port to another every time a connector end-face is mated
  • In fact, any time an end-face is exposed to the surrounding environment, it is subject to contamination                                                                Opti

Download White Paper

Falcongaze announced the start of cooperation with Bitrate, which is one of the leading suppliers of solutions for security, analysis and network monitoring in South Africa. The partnership agreement between the two companies was signed to expand geographical presence of Falcongaze in the international market. This will help ensure the security needs of South African businesses regarding Data Leakage Protection  are met.

The local network of any organization is like a body with lots of processes that are important to control in order to avoid economic and reputational losses. Bitrate, given the threats that lurk in corporate local network, the Internet and common communication channels, among other things, is engaged in supplying technical solutions designed to identify vulnerabilities and safeguard sensitive data.

Today the use of data leakage protection tools is in fact a prerequisite condition for companies that are committed to sustainable development and maintaining competitiveness in the changing external environment. The addition of Falcongaze SecureTower software will help our customers to deal with internal threats and ensure the security of sensitive data within a company’s network. SecureTower records and controls how sensitive data leave the network giving the CIO some peace that the enterprise is protected,” said Jeroen Dubbelman, Managing Director of Bitrate.

We seek to expand the markets for our software, and South Africa seems a promising region to us. The coalition with Bitrate is aimed at increasing of Falcongaze SecureTower brand awareness, as well as the expansion of the range of modern software solutions for business protection against internal threats in South Africa. We strongly believe that the collaboration will be successful and serve the common goals,” said Alexander Akimov, CEO of Falcongaze.

Eye on Networks: June Edition

Eye On Networks

Welcome to the June edition of Eye On Networks. Here you will find industry relevant information for Network Professionals, with a goal of keeping you informed about industry and job related trends.  Let us know what you think by shooting us an email at flukenetworksinfo@flukenetworks.com

Upcoming Events and Webcasts

Live Webinars
– 18 June at 10am BST – OneTouch 10Gb webinar in English | Register Now
–  30 June at 10am BST – XG webinar in English | Register Now
– 25 June at 10am CET – XG webinar in Dutch | Register Now
– 2 July at 10am CET – XG webinar  in French | Register Now

Recorded Webinars
– Answers to your top questions about network troubleshooting | View Now
– Live Demo of OptiView XG  | View Now
– Packet Analysis –From Wire to First Steps (Part 1) | View Now
– Packet Analysis – A Deeper Dive (Part 2)  | View Now

Borderless Enterprise Events – How are you managing it? 

- 8 June |  Partner Launch Event with new partners | Armani Hotel – Dubai | 9 – 17.00 | Register Now   | More Info
– 9 June |  Round Table for C-level Executives | Armani Hotel – Dubai | 10 – 13.30 |   More Info
- 10 June |  Half Day Seminar for IT Professionals | Armani Hotel – Dubai | 8.30 – 14.00 |  More Info
- 10 June |  Data Communications | informal presentation follow by BBQ |  More Info 
– 25 June |
Flow Communications | Seminar followd by rib boat ride on the Thames | London – UK | More Info 


IT Networking

Borderless Enterprise Launch
On May 19th, Fluke Networks launched its new solution framework – The Borderless Enterprise – with a number of new product launches including its first SaaS solution TruView Live. The core component of the Borderless Enterprise message is tied to the seismic shift of how new applications or services are being supplied. The traditional infrastructure-centric approach, where all new services started at the network and slowly built out internally, is being overrun by a plethora of options including SaaS, Cloud Platforms, BYOD and many more… Read more »

5 IT challenges for the Borderless Enterprise in 2015
The borderless enterprise will become a topic of increasing prevalence in 2015. This phenomenon is being driven by the adoption of cloud, mobile devices and wireless access…. Read more »

Borderless enterprises: the challenges it brings for IT

Tech Day’s Shannon Williams recently spoke with Bruce Kosbab, CTO of Fluke Networks, about the challenges facing IT when managing the ins and outs of the “borderless enterprise”…  Read more »

The Changing Role of Network Management

It’s impossible to read the trade press or attend a webinar these days and not be confronted with the fact that IT organizations are undergoing fundamental change. However, there is far less discussion about what those changes mean to network management…  Read more »


WLAN Analysis

What WLAN admins can learn from Starbucks
Earlier this week, reports surfaced about payment fraud attacks experienced by users of the Starbucks mobile app… Read more »

Are you vulnerable to the FREAK attack?
Last month, researchers in France discovered yet another gaping hole in SSL, dubbed the FREAK attack. FREAK is a downgrade vulnerability….  Read more »


Don’t fall into the “No iOS Zone”
In a recent RSA 2015 session entitled “Mobile Vulnerabilities: From Data Breach to Complete Shutdown,” the co-founders of Skycure took aim at iOS and its increasing number of network security vulnerabilities…  Read more »


Datacom Cabling       

Standards Update: The Four A’s of Harmonization
With ANSI/TIA being a North American standards body and ISO/IEC considered international, some often question why we need both, especially considering the similarities between the two…Read More

Fiber One Promo ends in 6 weeks. Last chance to save R 26 000

TRADE IN YOUR OLD FIBER Module set FOR A CERTIFIBER® PRO OPTICAL LOSS TEST SET…SAVE R 26 000 AND GET IT RIGHT THE FIRST TIME. For a limited time, your old fiber module set, any make, any model, is worth R 26 000 when you purchase a brand-new CertiFiber® Pro Optical Loss Test Module Set to be used with your DSX-5000 CableAnalyzerTM

Copper Certification Testing Best Practices Pocket Guide

The Copper Certification Testing Best Practices pocket guide was designed by Fluke Networks to help you maximize profitability whilst ensuring manufacturer warranty statements are promptly issued…Read More


    Free Fiber Testing Guide  Request a Free Evaluation  Managing the user experience

Partnership to help resellers maximize revenue opportunities through selling jetNEXUS advanced load balancing products.

jetNEXUS today announced it has appointed Bitrate as a distribution partner. The partnership with Bitrate will accelerate jetNEXUS’ growth in sub-Saharan Africa, while opening up significant new revenue streams for Bitrate’s resellers through the sale of advanced load balancing technology solutions.

jetNEXUS, in association with Bitrate, will run a formal, technical accreditation programme to on-board partners and help them better understand the technology and potential sales opportunities it offers. For a limited time only, partners will have access to free technical training.

It gives us great pleasure in inviting you and your team to the Technology Bazaar, an afternoon filled with exploring the datacentre and how to keep it clean with 3 international vendors all under one roof, namely: Palo Alto Networks, Nutanix and Fluke Networks. Bitrate drew on all its resources to host a spectacular cocktail afternoon for you to come indulge especially if your daily routine is to be IN or NEAR the datacentre.

Kindly accept our invitation by registering below.

Cisco Business Unit Manager
Cisco Business Unit Manager

Datacentrix, a complete ICT systems integrator that provides solutions and services across the full information value chain, has formed a strategic partnership with Bitrate to deliver award-winning network and application analysis, monitoring and troubleshooting solutions from Fluke Networks.

Fluke Networks, a Danaher Corporation-owned company, is a world leader in developing solutions that enable enterprises to gain comprehensive performance visibility across wired and wireless network infrastructure. The solutions are renowned for solving the toughest network and application performance issues.

“Too many enterprises spend their budgets blind-sighted on problems without knowing the root cause,” says Chris Pretorius, Cisco Business Unit Manager at Datacentrix. “We found an ease-of-use, benefit-rich, cost-effective solution that will support customers in accurate decision-making, and that will contribute to improving the business value of IT.”

There are discussions that we have with almost every customer we meet: evaluating the cost of performance degradation. Even if the cost is not obvious, after going through some simple steps, almost every customer realizes how big the operational loss induced by performance degradations is important. Here is a sample discussion we had with one of our customer, which could almost be any of our customers.

OTDR Testing Built for the Enterprise – OptiFiber Pro OTDR

MPO Fiber Testing – Optical Power Meter and Light Source

OTDR Testing – OptiFiber Pro OTDR Navigation Demo

Fluke Networks – Network On


Control it all with the new DSX-5000 CableAnalyzer
Member of the Versiv Cabling Certification Product Family

The new Versiv has been designed to accelerate every step on the path from project planning and instrument setup to system acceptance. Its revolutionary ProjX™ Management System puts you in control of up to 100 projects simultaneously. It is designed to get more jobs done first time right with less supervision. Thanks to ProjX the typical project and setup related problems that can seriously impact the profitability of a project, are prevented.

The health of your network depends on the quality of your network infrastructure — maintaining a reliable fiber plant is essential in protecting your business-critical applications. OTDRs are the tools of choice for maintaining and troubleshooting fiber LAN infrastructure – however choosing the right OTDR for your application can be challenging.


See the OptiView XG in action during live webinar hosted by Tony Fortunato, Senior Network Performance Specialist with The Technology Firm. Troubleshooting performance problems in today’s networks and data centers is only getting more complex. The growth of 10G links, virtualization, and cloud computing all bring their own analysis challenges. And the last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

The landscape of enterprise network infrastructures is undergoing a radical metamorphosis with mobility changing everything. A vast array of intelligent communication tools from smart phones to tablets is fuelling a BYOD culture that challenges the security policies and integrity of networked assets. Network and Security professionals are now facing a dilemma wanting to both enable the workforce to be as productive as possible for as long as possible, while still keeping the infrastructure and networked assets secure.


When users get frustrated with the performance of an application, it’s often difficult to isolate whether the cause of performance degradation is coming from the client, the servers, the network, or the behavior of the application itself. This on-demand webinar will walk you through the 5 steps to successful application troubleshooting so you can quickly resolve problems and end the finger pointing between your application developers and your IT staff.

Session-based / Flow-aware Load Balancing increases user control of traffic distribution amongst multiple monitoring tools, increasing output capacity while maintaining session integrity. Packets from a unique session flow will be balanced to the same tool port, always, using up to 10 balancing criteria, e.g. source and / or destination MAC address, EtherType, IP address, TCP/UDP port, and GTP TEID. Standard Load Balancing allows users to balance traffic based on up to ten criteria.

We invite you and your colleagues to attend our VSS Monitoring Seminar

What is Network Packet Brokering?1352122055_mikkopicture

Join Mikko Kiukkanen, VSS Monitoring EMEA Regional Sales Manager, to understand the differences between Network TAPS and Network Packet Brokers; as well as how to optimise  the effectiveness of your network security and performance tools while reducing costs.



VSS Monitoring Uniquely Defends Against Today’s Advanced Cyber-Attacks and Scales for Big Mobile Data Explosion with New Network Packet Broker Platforms

Cyber Attacks in South Korea, Saudi Arabia and Russia Highlight Major Gaps in Today’s Security, While Mobile Operators Struggle to Gain Visibility into Rapidly Expanding LTE Traffic

By Kirk O’Connor – Sr. Product Manager- Managed Services – Visual Network Systems

Last night in Washington, DC, I was driving home in a severe thunderstorm that had blinding lightning flashes and thundering canon booms. Two weeks ago we had lost power for 5 days in my home during the sweltering, summer heat and it was not pleasant (understatement). I was worried about losing power at the house and after checking in via the mobile phone, my mind wandered back to the office and work. If I was losing power at home, how would this storm impact my company’s network? Would I return to the office with a lack of insight into what devices or applications were up or down, for how long, etc.? Then I smiled.