Hillstone Networks protects the networks of small to large enterprises with layered security

SUNNYVALE, Calif.–(BUSINESS WIRE)–Hillstone Networks, a leading provider of network firewall solutions, today announced it has been named to Gartner’s Magic Quadrant for Enterprise Network Firewalls* as well as the Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) for the fourth consecutive year.

Networks and critical assets need to be protected from multiple postures: server front, at the perimeter and in the cloud, for a layered security defense – this is what Hillstone delivers. Hillstone has broadened its approach from a network-centric security provider to one of layered protection offering solutions that protect and monitor at the perimeter, in the cloud down to the virtual machine, as well as the server front.

Specifically for the cloud and virtual use cases, Hillstone CloudHive leverages micro-segmentation for VMware networks along with CloudEdge, a virtual firewall appliance for networks that are virtualized or access via a cloud. In addition, the Hillstone portfolio of firewall solutions are now available for hybrid networks such as deployments with a mix of on-premises, cloud and virtualized environments.

Hillstone’s innovative security platform combines Behavioral Intelligence with high-performance networking, stopping threats within minutes, and protecting the network.

“The threat landscape is a dynamic and most sophisticated one, and it takes more than a point product to ensure the safety of businesses and critical assets,” said Tim Liu, CTO and Co-Founder, Hillstone Networks. “Hillstone’s vision has always been to be one step ahead of hackers and malignant threats by delivering technology that understands the characteristics and behavior of ever-morphing threats. With our behavioral analysis tools, our solutions quickly learn the behavior of new threats and adapt in order to protect.”

The 2017 Magic Quadrant for Enterprise Network Firewalls as well as the June 2017 Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) reports are available to Gartner clients at www.gartner.com.

About Gartner Magic Quadrant:

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

* Source: Gartner, Inc., “Magic Quadrant for Enterprise Network Firewalls” by, Adam Hils, Jeremy D’Hoinne, Rajpreet Kaur and Greg Young, July 2017


About Hillstone Networks, Inc.

Hillstone Networks’ Layered Threat Protection provides continuous threat defense at traditional perimeters, internal networks and their critical assets, down to each virtual machine. Established in 2006 by NetScreen, Cisco and Juniper executives, Hillstone Networks is relied on by more than 14,000 customers around the world, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks’ US headquarters is located in Sunnyvale, California. To learn more, visit www.hillstonenet.com.


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today. Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

SUNNYVALE, Calif.–(BUSINESS WIRE)–Hillstone Networks, a leading provider of network security solutions, announced today that Network Products Guide, industry’s leading technology research and advisory guide, has named Hillstone intelligent Next Generation Firewall (iNGFW) a Gold winner in the 12th Annual 2017 IT World Awards® in the Enterprise Network Firewall category, and Hillstone CloudHive a Gold winner in the Cloud Security category.

These industry and peer recognitions from Network Products Guide are the world’s premier information technology awards honoring achievements and recognitions in every facet of the IT industry. Winners from all over the world will be honored in San Francisco on Monday, June 26, 2017 during the 2017 SVUS Red Carpet Awards Ceremony Dinner in San Francisco.

Hillstone delivers Layered Security to protect businesses and their core assets. Hillstone’s intelligent Next Generation Firewall (iNGFW) provides continuous threat defense for today’s modern networks against sophisticated threats, through three differentiating technologies that work together for continuous monitoring and protection.

Hillstone CloudHive delivers security for virtualized datacenters. It provides micro-segmentation to secure each virtual machine (VM) in the cloud. It includes three virtual modules that work together as a single appliance to provide complete security to each VM and to stop lateral attacks between the VMs.

Looking at the threat landscape through these disparate lenses helps protect the network and its critical assets from multiple layers for a more comprehensive security posture. Learn more here.

An annual achievements and recognition awards program with active participation from a broad spectrum of industry voices, the coveted annual IT World Awards recognition program encompasses the world’s best in organizational performance, products and services, hot technologies, executives and management teams, successful deployments, product management and engineering, customer satisfaction, and public relations in every area of information technology.

“It’s an honor to be named a winner by IT World Awards,” said Lingling Zhang, VP, Product and Marketing. “Today’s network security issues are becoming ever more complex and sophisticated, as we see on the headlines daily, including the latest WannaCry incident. Businesses are looking for a holistic and layered security approach to protect their critical assets and network. Hillstone is poised to deliver on that, as validated by this recognition.”

About NPG’s IT World Awards

As industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision makers and end-users informed of the choices they can make in all areas of information technology. The Annual IT World Awards is part of the SVUS Awards® recognition program from Silicon Valley in the United States of America which also includes other programs such as CEO World Awards, Consumer World Awards, Customer Sales and Service World Awards, Golden Bridge Awards, Globee Fastest Growing Private Companies Awards, Info Security PG’s Global Excellence Awards, Pillar World Awards, PR World Awards, and Women World Awards. To learn more, visit www.networkproductsguide.com.

About Hillstone Networks, Inc.

Hillstone Networks’ Layered Threat Protection provides continuous threat defense at traditional perimeters, internal networks and their critical assets, down to each virtual machine. Established in 2006 by NetScreen, Cisco and Juniper executives, Hillstone Networks is relied on by more than 14,000 customers around the world, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks’ US headquarters is located in Sunnyvale, California. To learn more, visit www.hillstonenet.com.


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today. Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

Everett, Wash. – June 12, 2017 – Fluke Networks is bringing increased productivity and enhanced ROI to small cable installation jobs with the addition of the DSX-600 CableAnalyzer – an affordably priced entry-level copper certifier. Designed to provide essential Category 6A and Class EA copper certification, the DSX-600 increases the efficiency of small electrical contractors who install and test copper networks.

The Fluke Networks DSX-600 streamlines every aspect of the certification job – from setup, to testing and troubleshooting, to reporting results to the customer. It can perform Cat 6 and Class E certification tests in a speedy nine seconds and handles Cat 6A tests and Class EA in just ten, enabling installers to test hundreds of links every eight-hour shift. Furthermore, its extended battery life means that it can perform eight hours of tests on a single charge.

Thanks to its ProjX™ system, the DSX-600 helps manage job requirements and progress from set-up to systems acceptance, making sure that test setup is foolproof and that all tests are completed “right the first time.” Meanwhile, compatibility with the LinkWare™ Live cloud-based service means that contractors can manage certification jobs and testers from any smart device over Wi-Fi at any time and from any location. Since its launch in 2014, users have uploaded over four million test results to LinkWare Live. The DSX-600 also works with LinkWare™ PC, so contractors can create professional customer PDF reports quickly and easily.

The DSX-600 features a touchscreen user interface, allowing technicians to spend less time pushing buttons and more time testing.  Should a link fail, built-in troubleshooting analytics provide tools to help users identify the location of the failure.

“Now, even contractors who only test small copper installations can perform accurate and quality cable certification with the worldwide leader”, commented Thomas Roth, Senior Director of Marketing at Fluke Networks. “The DSX-600 provides essential certification backed by twenty-five years of cable testing history, thirteen worldwide service centers, and a support team who have authored over one thousand support articles.”

The DSX -600 is available in two versions – the base model that includes Channel Adapters and the DSX-600-Pro, which adds Permanent Link Adapters. The DSX-600 is backed by Fluke Networks’ worldwide support including service centers in 13 countries and training available in 50.

Availability – The Fluke Networks DSX-600 CableAnalyzer is available to order now from resellers of Fluke Networks’ products. For more information, please visit www.flukenetworks.com/DSX-600.

About Fluke Networks

Fluke Networks is the worldwide leader in certification, troubleshooting, and installation tools for professionals who install and maintain critical network cabling infrastructure.  From installing the most advanced data centers to restoring service in the worst weather, our combination of legendary reliability and unmatched performance ensure jobs are done efficiently. The company’s flagship products include the innovative LinkWare Live — the world’s first cloud-connected cable certification capability –introduced in late 2014


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today. Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

Bitrate, value added distributor of Network Monitoring and Security solutions in the Information Technology environment, is now representing Hillstone Networks in South Africa and Sub-Sahara Africa.

Hillstone Networks are recognized for their Intelligent Next Generation Firewalls and for their incredible performance on the NSS Labs Next Generation Firewall report. They achieved a NSS Labs recommended status with the best value per protected Mbps of all the tested Next Generation Firewalls.

“This value is what our customers are looking for in the market today” says Jeroen Dubbelman MD of Bitrate, “South Africa is experiencing very tough conditions economically and enterprises are constantly searching for a combination of quality and cost effectiveness.”

Hillstone Networks’s performance speaks for itself. The product line covers multiple facets of information security including Next Generation Firewalls, Intrusion Prevention Systems, Server Breach Detection, virtual firewalls for the edge and micro-segmentation. Hillstone Networks also covers both private and public cloud environments.

The solution set is mature with carrier grade quality and functionality. Hillstone Networks caters for the small to medium sized organisations, as well as large enterprises and Service Providers/Carriers with a comprehensive range of solutions.

“Hillstone Networks is awesome to see in action as it includes Abnormal Behavior Detection in its T-Series range that helps graphically map and understand the Kill Chain” says Dubbelman. “There is additional functionality like Link Load Balancing and Server Load Balancing which further increases the value of the solution”.

Hillstone Networks:

Today, enterprise network security professionals understand the importance of having comprehensive layered defenses. From direct monetary threats like ransomware where the lifeblood of the enterprise, its data and applications are being held hostage, to socially engineered threats including Phishing, Pretexting, Tailgating, Baiting and Quid Pro Quo, the goal of the attacker is essentially the same: to extract something of value from the network.

As threats and networks have become increasing more complex, defending against the expanded attack surface makes defense geometrically more complex. Hillstone‘s Layered Threat Protection is a portfolio of products that will help you keep your business more secure. Today, more than 14,000 enterprise networks worldwide rely on Hillstone solutions making it safer choice for your business.


Bitrate focuses on adding value to resale partners which in turn helps them optimize their solutions to their clients. Bitrate focuses on delivering solutions to the market that help clients reduce total cost of ownership, improve their security posture and experience the richness of technology of today.


Bitrate in operation since 1999 has substantial experience in IT security, network monitoring, application performance monitoring, network troubleshooting and cable infrastructure certification.

data-protection-1 (002)


CyberRiskAware is delighted to announce the latest addition to its user security awareness training library with the launch of a Data Protection course dedicated to enabling South African companies achieve compliance with the Protection of Personal Information (PoPi) Act 2013. The PoPi module increases our library to over 28 security topics for staff to enjoy and complements other regional Data Protection courses covering United States of America (HIPAA), United Kingdom (Data Protection Act) and Ireland (Data Protection Act and GDPR).

Other topics in our awareness library include password, email, social media, web security, social  engineering and public WIFI security.

All CyberRiskAware training content is designed with the user in mind and their busy schedules. Unlike all other content providers, we deliver “golden nugget” short, enjoyable and interactive content with videos never lasting more than 1 minute and courses less than 8 minutes.

data-protection-2 (002)

CyberRiskAware CEO Stephen Burke: Some 95% of security incidents are caused by human error.

Taking a “prevention is better than cure” approach to cybersecurity, Dublin start-up CyberRiskAware is targeting global markets with technology designed to train company staff to identify malicious emails and other cyber threats.

“Some 95% of security incidents are caused by human error’,’ said company founder and CEO Stephen Burke, saying that human error mainly involves the opening by staff of phishing emails containing ransomware, malware and fraudulent requests for money transfers, known as CEO fraud.

“In the last year there has been a 250% increase in phishing scams. Recent figures show that 86% of all email phishing attacks contain ransomware and that 95% of all successful cyber attacks start from phishing.”

Observing the escalation of global cyber attacks, Mr Burke, while working as a chief information security officer for a global financial services company, decided there was a gap in the market for a company offering a proactive approach to cybersecurity.

He said: “There were products but these mostly involve a 40-minute training course which takes place once a year and is just a tick the box-compliance exercise. What is needed to reinforce the message is short and frequent training, with engaging and enjoyable content.”

Believing there was a need for a cybersecurity product which could deliver the right message to the right user at the right time, he set up CRA in January 2016.

Using his own funding, he recruited three other cybersecurity specialists as directors and set about building a minimum viable product. In April, CRA launched a mock phishing platform and an email security course.

“We made our first sale in June to a large UK/Irish retailer. Since then we have had additional sales in Africa and are awaiting the sign-off of several business cases in Ireland and the UK,” he said.

The mock phishing platform is designed to allow employers test employees response to cyber threat and to identify those in need of extra training.

It typically finds that 23% of employees open phishing emails and that 11% of them go on to open attachments or links. In addition, the company offers short training courses courses and videos covering 24 security topics as well as a security assessment quiz.

CRA has also added real time messaging, which according to Mr Burke, is unique to the company and sets it apart from its competitors. It operates by sending relevant messages when risky behaviour, such as using USB keys or downloading from the internet, is detected.

Mr Burke has signed channel partnership agreements with eight cybersecurity and insurance companies — including three in the US, four in the UK, and one in South Africa. Estimating the company platform already has in the region of 2,000 users, he says the plan for 2017 is to ramp up sales.

Revenue is earned from annual subscriptions based on usage and content. The core product is the mock phishing platform.

“We charge a minimum price of €25 per person for this based on a minimum of 100 users, with a lower charge for a higher number of users,’’ he said.

At the end of 2016, the company received €50,000 in competitive Start Funding from Enterprise Ireland which has been used to expand the company’s training range and its website. Identified as a high-potential start-up by Enterprise Ireland, CRA is now planning to embark on a significant funding round.

Mr Burke said: “We will apply for high- potential start-up funding and will also be looking for private funding. Our aim is to raise between €750,000 and €2m this year.”

The funding is needed to market the company internationally and to develop the team. CRA plans to take on at least six staff and aim to achieve a turnover of €1m. It then aims to double that in 2018.

With cyber attacks now estimated to cost €2.85tn a year, he believes there is huge scope for CRA’s e-learning platform.

FNET Field Agent XU49, we have new assignment for you. Proceed with this communique only if you can handle significant advantages.

25th Ann
Your mission
On 23rd of January 2017, at exactly 16.00 hrs. Central European time, you will log onto a special – super secret – webinar. One that has been created to give the casual observer the appearance of an ordinary Fluke Networks 25th Anniversary Global Celebration. Indeed, you may also think of it as ordinary – just like any other Fluke Networks 25th Anniversary Global Webinar. But you will know that this is just a facade, and you will know how to take advantage.

Indeed, it was just 25 years ago that Fluke Networks was first brought into existence. Now your time has come. You will log on to the special Fluke Networks 25 Anniversary Global Webinar using the special code words and pass algorithms detailed below.

First part of your mission: As one of our important agents in the field, you will want to know what we will communicate to the more than 500 network installation professionals that we will address with special announcements, so make sure you are there!
Second part of your mission: You yourself also know a lot of network installation professionals – your second part of the mission is to communicate our message to as many of them as you deem fit to hear it as well (we know you know best who to select). For this, we will allow you to use attached message that will also be sent by HQ.

You will witness how Fluke Networks intends to mark this important milestone and how that marking will dramatically affect the network installation business in the future.

You will then use this knowledge to increase your profitability as important agent in the Field.

Good luck, and look good.

Register for webinar


AirCheck G2 allows frontline technicians to resolve 802.11ac problems quickly and efficiently

 WESTFORD, Mass. — May 17, 2016 — NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a market leader in service assurance and cybersecurity solutions, today launched the next generation of the AirCheck™ Handheld Wireless Tester. This industry-leading tool is available through NETSCOUT’s recently launched CONNECT360 global channel partner program, and includes important new enhancements, such as troubleshooting and diagnosing WiFi networks built using the increasingly adopted 802.11ac standard, access point backhaul testing, and free access to the Link-Live™ Cloud dashboard for more effective results management.

“NETSCOUT is very excited to be releasing the AirCheck G2, which arms technicians with easy-to-understand insights to 802.11ac wireless networks that help reduce costly escalations,” stated Michael Szabados, chief operating officer for NETSCOUT. “The AirCheck G2 sports a sleek new look designed with the same quality engineering our customers and the marketplace have come to trust. NETSCOUT is a firm believer that wireless network edge technologies, such as 802.11ac, will play a pivotal role in the evolution of the Internet of Things (IoT) and other industries that require ubiquitous reach and mobility. NETSCOUT’s value proposition has been anchored around helping customers gain the real-time operational intelligence and insight necessary to ensure a high-quality end-user experience, and this new tool embodies this focus by providing front-line technicians with the capability to effectively troubleshoot issues that can impact WiFi network performance.”

New AirCheck G2 enhancements include:

  • 11ac 3×3 radio to support next-generation wireless initiatives
  • Link-Live integration for collaboration, reporting and results management
  • 5” touchscreen display for improved ease-of-use
  • Ethernet tests for AP backhaul verification

“NETSCOUT has clearly hit a home-run with the AirCheck G2. Not only is it a perfect replacement for the venerable generation one AirCheck, it comes packed with features that will make it the triage tool of choice for WiFi professionals everywhere. In addition to the 802.11ac and touch screen functionality, NETSCOUT raised the bar by integrating wired testing directly into the unit – a must have for not only RF Designers but Access Point installers,” explained Sam Clements, mobility practice manager at Presidio, a leading US-based IT solutions provider offering consulting, professional services, and cloud and managed services. “Couple the new features with Cloud integration and it’s the perfect tool for a distributed nationwide team, or a tactical one-on-one engagement. The ‘at a touch’ insight that the AirCheck G2 brings to our team throughout all cycles of lifecycle management makes it an invaluable asset to all levels of WiFi admins, engineers, and designers.”

“The 802.11ac standard is fast becoming the industry preference with adoption rates in 2015 reaching 54.5% of dependent access point unit shipments and 71.3% of dependent access point revenues,” said Nolan Greene, research analyst, Network Infrastructure at IDC. “As enterprise mobility becomes ubiquitous and IoT applications move into the mainstream, there will be increased demand on enterprise WLANs. The NETSCOUT AirCheck G2 Handheld Wireless Tester’s strong, industry-leading capabilities around the 802.11ac standard will be absolutely critical in supporting next-generation wireless initiatives.”



NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) is a market leader in real-time service assurance and cybersecurity solutions for today’s most demanding service provider, enterprise and government networks. NETSCOUT’s Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve issues that can cause business disruptions or impact user experience. NETSCOUT delivers unmatched service visibility and protects the digital infrastructure that supports our connected world. To learn more, visit www.netscout.com.

©2016 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, the NETSCOUT logo, Guardians of the Connected World, Adaptive Service Intelligence, AirCheck, Link-Live, LinkRunner, LinkSprinter, nGenius, nGeniusONE are registered trademarks or trademarks of NETSCOUT SYSTEMS, INC., and/or its subsidiaries and/or affiliates in the USA and/or other countries. Third-party trademarks mentioned are the property of their respective owners.

Khipu Networks, global provider of Cyber Security Solutions across, and Bitrate, distributor of cutting-edge network technologies, today announce their partnership in providing secure network access control through their partnership with Bradford Networks.

Working together with existing customers and enterprise prospects, the partnership ensures that the strength of networks across South Africa increases exponentially by providing a flexible, versatile solution that provides the ability to have complete visibility of one’s network. With the increased number of devices, including laptops, tablets and smartphones that need to be centrally-managed on networks across the country, automation and visibility of what is happening on existing networks is imperative in providing a safe, secure network for both organisations and end-users alike.

Working in partnership with Bradford Networks, Khipu Networks and Bitrate will be able to provide a network access control solution for both wired and wireless access that is able to:

  • Support all types of devices (desktop, mobile, IoT) connecting to the network
  • Little or no network re-design
  • Not be reliant on a particular wired or wireless vendor
  • Utilise a proven out-of-band architecture that scales and does not require server in each location
  • Automate registration and onboarding
  • Enforce security policies for use cases ranging from network access control to endpoint containment

‘The key to this partnership, as we see it, is Network Sentry’s ability to complement some of our existing security products. The integration, for example, with Palo Alto Networks Next-Generation firewalls, makes the NAC solution all that much more valuable.’ – Jeroen Dubbleman, Managing Director, Bitrate

For years Bradford Networks has been working on providing Network Access solutions around the world to various large scale networks with key accounts in the USA, Europe, Asia and now Africa. With ransomware, phishing attacks and malware running wild across the globe, the launch of this partnership could not have come at a better time in South Africa as banks, government departments, universities, schools and even retailers are actively in the crosshairs of cyber criminals.

‘As a Network Security company, what we strive for is giving our customers visibility, access and control of their networks, by partnering with Bitrate, we feel that we are able to offer this to a wider scope of customers across South Africa and hopefully Africa.’ – Matt Ashman, Director, Khipu Networks

Network Sentry is the first network security offering that automatically identifies and profiles all devices and all users on a network, providing complete visibility and control. The solution provides automatic registration of the user’s device(s) the first time they connect to the network. If the user / device is valid, the system then enforces an Acceptable Use Policy (AUP) and security compliance check including ensuring that virus and spyware protection is present and up-to-date. Devices without the proper security settings are remediated with simple instructions to ‘self-fix’ their device before being granted network access. The mobile devices are then able to roam the network without having to re-register.

‘We are beyond excited about our expanding Network Sentry into South Africa, we have had a long standing relationship with Khipu Networks and to now have Bitrate on board can only bode well for the security of networks across South Africa.’ – Gary Mead, International Sales, Bradford Networks

For more information, contact http://www.khipu-networks.com/

About Bitrate

Bitrate was founded in 1999 and is focused on the supply of network analysis, data centre infrastructure, information technology security and maintenance equipment. The company is currently the official supplier of the Fluke Networks range of test tools, Palo Alto Networks. Visit http://www.bitrate.co.za/ to learn more.

Partnership Delivers Next Generation Data Center Solution to Help Customers Respond to Real-Time Needs with Efficiency and Operational Simplicity

South Africa — May 23, 2016 — Bitrate, a leading supplier of network analysis, infrastructure, security and maintenance equipment in South Africa, today announced a partnership with Stratoscale, the software company revolutionizing the data center, to deliver comprehensive, flexible and scalable data center cloud solutions to its customers.


Stratoscale’s 360 degrees partner program, PartnerFirst, was created with an all-inclusive approach to maximize partner’s technology, products and services with the goal of bringing mutual benefits to customers and partners. By partnering with Stratoscale, Bitrate is bringing the simplicity of the public cloud into the enterprise data center, providing an experience and capabilities that are scalable, expandable and affordable.


“With Stratoscale’s hardware-agnostic SDDC solution, we are able to add value to our customers by providing innovative cloud solutions, and create a competitive advantage for our partners,” said Jeroen Dubbelman MD of Bitrate. “Our partnership with Stratoscale enables us to offer a solution that will meet the business needs of our customers and scale as their business grows.”


Stratoscale has brought the control back to IT by providing unparalleled private cloud capabilities in the data center in a way that’s faster and simpler than legacy infrastructure, and doesn’t require specific expertise or expensive services. Offered through its channel partners, Stratoscale’s hardware-agnostic, easy-to-use software platform, Stratoscale Symphony, delivers cloud-scale economics to data centers of all sizes with efficiency and operational simplicity.


“Through our PartnerFirst program, Stratoscale is building an ecosystem of technology and distribution partners, as well as expanding coverage and customer service to meet market demand for next generation data centers,” said Ariel Maislos, CEO of Stratoscale. “We are excited to be working with Bitrate to help them grow their business by having a best-in-class product to offer existing customers. Not only does our PartnerFirst program offer innovation in technology, sales and marketing support but it ensures our partners’ success in their go to market plan.”


About Bitrate

Bitrate was founded in 1999 and is focused on the supply of network analysis, data centre infrastructure, information technology security and maintenance equipment. The company is currently the official supplier of the Fluke Networks range of test tools, Palo Alto Networks, Netscout, Airmagnet, Falcongaze, Luxartech  and the EfficientIP range of Core Network Services Equipment. Training in the effective use of the tools is key in order provide full customer satisfaction. It is vital so that the customer enjoys the full benefits of their investment in the products. The equipment we supply must constantly evolve and adapt to the latest networking environment. We at Bitrate know that in order to remain a leader in the field we need to supply the best the industry has to offer, therefore we constantly search for the best solutions for our customers. For more information, visit http://www.bitrate.co.za/.


About Stratoscale

Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere, IT is empowered to take control of their data centers. Stratoscale is offering a hyperconverged cloud supporting OpenStack out of the box. Led by an experienced management team that brings a proven track record in the field of startups, Stratoscale was named a “Cool Vendor in Servers and Virtualization” by Gartner. Stratoscale is backed by leading investors including: Battery Ventures, Bessemer Venture Partners, Cisco, Intel, Qualcomm Ventures and SanDisk. For more information, visit http://www.stratoscale.com.


infoGraphics - PR-Messengers

Today messengers rightfully occupy a worthy place among the most used office software and tools for business communication. Every company determines what software should be used by staff to keep in touch with colleagues, partners and customers, and sometimes allows employees to make these choices on their own. In addition to user-friendliness,today, when video cameras, wireless mice, fitness trackers, smart cars and even toilets can be easily hacked, the security of communication tools comes to the fore.

Analytics Center of Falcongaze, a vendor of software solutions in the field of data leak prevention via various channels (email,social networks, instant messengers, USB devices, etc.), has made a rating of the most popular instant messengers, grounding on their level of security.

The rating was based on two criteria: the popularity of messengers among users and their security. Security,in turn, was evaluated by two main factors: if the protocol open or closed and whether end-to-end encryption is implemented (when encrypted data are transmitted from one device to another directly, without intermediaries). In addition, information about vulnerabilities in instant messengers, obtained from public sources, was taken into account as well.

Yahoo! Messenger with all the bells and whistles of popular instant messengers closes the top ten. The protocol, as well as the code of Messenger,is not open, users do not have an opportunity to verify contacts’ identities,there is no end-to-end encryption. However, the experts of Falcongaze Analytics Center give credit to the Yahoo! Messenger developers for fixing security vulnerabilities and assign the tenth position to the messenger.

A popular application (100 Million daily active users), which is more known for its photo and video messages than standard text chats – Snap chat – occupies the ninth position in the Falcongaze’s rating. It is an instant messaging application that allows users to send self-deleting messages to one another. Snapchat’s code is closed. As for encryption, all the messages are encrypted in transit. To encrypt the information exchanged between users Snapchat uses the same key for every message, which does not provide full security. In addition, Snapchat has gone through major cyber security challenges since 2011, for example in 2014 personal credentials of 4.6 million U.S. Snapchat users, such as phone numbers and usernames, were made public on a website.

However,the vendor of Snapchat took measures to eliminate security vulnerabilities, introduced two-factor authentication and initiated reporting about its transparency. Moreover, Snapchat initiated a bug bounty program that encourages researchers to find and report security vulnerabilities in the application. In addition, it has recently been reported that Snapchat is currently working on stronger encryption technology,so it has a good chance of occupying a higher position in the rating of Falcongaze in the future.

Messenger of social network, which is among the five most visited web sites in the world – Facebook Messenger – is located just above. This messenger does not provide end-to-end encryption when only the people communicating can read the messages. In addition, Facebook Messenger previously appeared in the center of the scandal since during the installation it requested permission to use the microphone on a user’s device to record audio at any time and without their confirmation. If a user inadvertently gave permission to do so, the messenger had the opportunity to not only record audio, but also take photos and video sat any time and without confirmation from a user. This mobile messenger ranks eighth in the list.

Simple enough to use Google Hangouts encrypts all the information, including video conferences. However, as in the case of the messenger, which took the eighth place in the list, the data are encrypted only when transmitted from a device to the developer’s server and from the server to the user’s interlocutors. That means that when they get to the server, there are no security guarantees. This encryption is called in transit and does not protect conversations of Hangouts followers from falling into the hands of third parties. The seventh position gets the messenger of Google company.


BlackBerry Messenger (BBM) is an instant messaging app that allows users to exchange text messages, make voice calls, photo, file and location sharing. It has no end-to-end encryption, users have no opportunity to verify contacts’ identities and the code is not open-source.

Nevertheless, it must be mentioned that in the beginning of April 2016, BlackBerry announced that some key BBM privacy features would become free for all users. After the update users will be able to use Retract, which allows them to delete a message from both the sender and recipient, and Timer, which set limits on how long a message or photo can be viewed, for free. What is more, the message editing and Private Chat, a feature that removes names and avatars from the chat window, will become available at all platforms. BlackBerry Messenger occupies the sixth position in the rating of Falcongaze’s experts.

Good old Skype, which has been used for years by both individual and corporate users due to its convenience and vast possibilities, actually turns out to be not so good. The protocol of this messenger is closed, so it is difficult to assess security measures laid down by developers, and encryption used in Skype does not provide adequate protection. Once in 2011 Skype was bought by Microsoft,the fact that the security services have access to the correspondence of users,is not especially withheld. For high user loyalty and the presence of encryption Skype is awarded with the fifth place.


At “LINE Conference Tokyo 2016″ the developers of LINE,which is one of the most popular messengers, especially in Asia, announced the app had grown into a global service surpassing 1 billion users and achieving an MAU (Monthly Average Users) of 215 million. Security is not an empty word for LINE: in 2015 end-to-end encryption was deployed, which is turned on in the settings page called “Letter Sealing”. LINE plans to switch it on byde fault for all users, initially it is only default for those with one Android device registered to their account. There are also plans to add encrypted sealing to Line for desktop and other operating systems over time. LINE tread son the heels of the top three and is ranked fourth.


Fast favorite with users Viber took the third spot of the charts.Within a short period the development of Viber Media company was able to win glory of the immense number of people: now the number of users has exceeded half a million and is moving steadily to around a billion. The messenger’s protocolis closed. However, it has recently become known that end-to-end encryption of communications, voice calls, photos and videos, will be deployed into the new version of Viber. What is more, there also will appear private chats in Viber, like those that have already been implemented in Telegram, to which we will address later. Access to the hidden correspondence of these chats will be available after entering the PIN-code, and iOS users will be able to get authorization by fingerprint. So far, end-to-end encryption, according to the developer, is available in a limited number of countries, and after successful testing in the nearest future it will become available for all users. Therefore, Viber takes the third place on the pedestal of the most secure popular instant messengers.


Silver medal in the rating of messengers by Falcongaze gets WhatsApp. This messenger gained popularity long ago – the number of WhatsApp users stepped over one billion. Protocol oft he IM is open, and since 2014 WhatsApp supports end-to-end encryption for Android devices. However, in early April 2016 the company Open Whisper Systems announced the introduction of complete end-to-end encryption in WhatsApp for all platforms. Now the messenger encrypts absolutely all data transmitted by users,and even WhatsApp employees wouldn’t be able to decrypt them. The second place goes to WhatsApp.


The rating of the most secure popular messengers is headed by rapidly gaining users Telegram. As of February 2016 the number of active users of relatively recently appeared messenger was more than 100 million people. Source code, protocol and API in Telegram are open, and to provide security of user correspondence strong encryption is implemented. Both regular and secret chats are available.In regular chats client-server encryption is used, while secret chats use end-to-end encryption. Secret chats also support self-destructing messages, and Self-Destruct Timer can be set to the desired time limit. As soon as the time runs out, the message disappears from both devices. A secret chat with a particular user can only be accessed on the device of origin, and messages from secret chats cannot be forwarded. In addition, each user can set a password to log into their account or set up authentication by fingerprint. Telegram promised to pay a reward of $ 300,000 for hacking the correspondence of the two bots and extracting a secret email address from a secret chat between the bots. The experts of Falcongaze reward telegram with the first place in the rating of the most secure popular messengers.

The adoption of an Information Security Policy is an obvious step for companies who care about their own well-being, it’s an integral part of governance to ensure the protection of business. Falcongaze Analytics Center highlights what it means and why it is essential.

An Information Security Policy outlines the main principles and general concept for the setting up information security at a particular organization. It should reflect the organizations goals for security and the approved strategy for securing data. When viewed in the narrow context, an Information Security Policy describes and regulates all business processes in terms of their security.

Why do you need an Information Security Policy?

The main objective of an information security policy is to enter in the record the information security rules within the organization. Without it, the interaction of employees with a variety of resources will be regulated only informally and therefore the risk of breaches and data leaks will increase. The introduction of the corporate policy will raise the discipline and consciousness of employees and build a foundation based on which you can efficiently organize the work of the company.

When developing a corporate security policy you should start by determining risks that threaten the company. This means first of all to specify what information assets must be protected, to which threats those assets are subjected, and what damage the company faces in the case of experiencing these threats.

The process of introducing protective measures is always a search for a compromise between comfort and risk mitigation. The implementation of an Information Security Policy is an act of formalization of this compromise. The adoption of an Information Security Policy will help to minimize situations in which an average user does not take the recommendations of the Information Security department seriously, or information security officers try to protect everyone from everything, disrupting business performance of the company.

What an Information Security Policy should contain

Security must be ensured at all levels, so an Information Security Policy should address all systems, networks, data, software and, of course, users. For example, you compile the list of servers and the list of employees who have access to them, define tasks and responsibilities. Even more important in the development of security regulations is the security policy of workplaces, in particular the policy of working with Web Resources. It regulates the responsibility and duties of employees in terms of working on the Internet or within the organizations network.

All the information should be classified. There should be no ambiguity in the terminology. There also should be references to supporting documents (e.g. guidelines, procedures, technology standards, etc.).

In addition, an Information Security Policy should include all the measures, which the company uses to monitor compliance with the policies, and specify consequences for non-compliance. Transparency is a must both in creating an Information Security Policy and familiarization of employees with it.

Monitoring of compliance with an Information Security Policy

There are various methods of compliance control. Diverse software designed to monitor the activities of employees in the workplace is available both separately and as part of comprehensive products. Such security platforms as Falcongaze SecureTower, in addition to their primary function of data leak prevention, allows one to monitor the activities of employees and identify all violations.

The introduction of an Information Security Policy is not a one-time event, but a long-term process, which should involve the representatives of IS- and IT departments, as well as heads of other departments, so that all factors would be taken into consideration. One of the main goal




Tailored industry relevant information for
Network Professionals to keep you updated about the latest industry and job
related trends.

> Upcoming Events and Resources

> Datacom Cabling News


Exhibitions and Events

CCTT Training-Certified Cabling Test Technician
Program. Two-day training and certification program that will not only
improve installer skills, but also the effectiveness and productivity on the
job. Esharp training centre at 209, Al Qusais Plaza, Damascus Street,
Qusais, Dubai

9/10 March & 16/17 March    
From 9am till
More Information


  All the latest resources

>  Versiv kit configurator English

> Versiv kit configurator French


Dumb Thing #10: Skipping Out on Proper Fiber

While the smart people who install, test and certify
network cabling plants know the importance of meeting standards performance
parameters and ensuring application support, even the best of us can make
mistakes that adversely impact the bottom line and customer satisfaction.

Let’s take a look at the #10 Dumb Thing that smart
people do when testing network cabling systems—skipping out on proper fiber

Get the Warranty the First Time Around

Virtually all of your customers are going to want the
system warranty offered by their cabling manufacturer. It also lowers risk
for architects, consultants and engineers by proving that the system meets
the intended performance to support the customer’s applications, while
helping to avoid finger pointing and callbacks that are every contractor’s
worst nightmare. A system warranty is essentially your best insurance
policy.

Get the New Fiber Certification Poster for FREE       
Request now >>

Best Practices for Cleaning Up Your Fiber

While it seems we can’t drive the point home enough
that the number one cause of fiber network issues and failures is
contaminated connectors, we hope by now that all fiber technicians at least
know that they are SUPPOSED to clean and inspect every fiber end face before
making that final connection. But are you cleaning those fiber end faces
correctly? Let’s take a look at some best practices.

Read More >>

Get the Cable Testing Certification Standards poster for FREE  Request now >>

Dumb Thing #9: Relying on a Duplex Tester for Certifying MPO Trunks

While the smart people who install, test and certify
network cabling plants know the importance of meeting standards performance
parameters and ensuring application support, even the best of us can make
mistakes that adversely impact the bottom line and customer satisfaction.

Let’s take a look at the #9
Dumb Thing that smart people do when testing network cabling systems—relying
on a duplex tester for certifying MPO trunks.

Be in the Loop about Smarter Bidirectiona Testing  When it comes to  Tier 2 testing using an OTDR, measuring the loss of specific events like connectors and splices, as well as overall link loss, depends on the direction in which the measurement is made.  

  Read More >> 

Building a smart and effective information security infrastructure is quite a challenging task many companies cannot embrace to the full extent, which results in gaps in corporate security. You have installed an antivirus – and an employee has opened a link in a phishing email. You have set up a firewall – and a disloyal employee has emailed your Business Plan to competitors. You have implemented a DLP system – and a DDoS attack has shut your web services down. Because of the diversity of threats, companies need a comprehensive approach to the protection of information resources. Falcongaze Analytics Center compiled a list of preventive measures that will help to minimize risks, prevent leaks of confidential information and ensure the safety of business.

 Document Management

A well-organized system of information storage and document management is an important, though often overlooked component of building information security infrastructure. Companies often do not have firm knowledge of where exactly their sensitive information resides on the network. The main objective in this situation is to gain knowledge about the location of sensitive information, its structure and access rights. It is pointless to try to protect a vague set of documents – all data should be classified and structured. These tasks are covered by various enterprise project management and DMS products. In cases, when operational convenience involves remote workforce, access to confidential data and corporate resources can be established over the Internet. The volumes of data in these situations should be minimized and the employees should connect to the resources over secure channels.

 Access Rights Management

Every company is subdivided into divisions or departments, which have various levels of responsibility and competence. The bigger a company, the higher staff diversity, the more complicated corporate structure. Growth often comes with new divisions, remote offices and regional branches. It is quite obvious that each user group requires its own level of access rights, especially when dealing with confidential information. Bank accounts info and contract details are within the Accounting Department professional competence, and IT division has nothing to do with this data for sure. Accounting officers should be definitely kept away from servers and development resources. To ensure such an approach there is diverse identity management functionality available, and most of the corporate systems allow creating group policies.

Some information security products, like SecureTower by Falcongaze, provide division managers with access to information on their staff only; information security officers have access to security incidents only and cannot browse through user activities; information on financial documents, transmitted by accounting officers, can be available to the CEO solely. All components of corporate infrastructure should be tuned in a similar way: configuration of various prohibition levels on firewalls, access to documents can be easily configured in all major project management solutions, physical access is covered by access control and management systems.

Cooperation between Falcongaze and Bitrate has reached a new level. The companies announce the launch of a new joint campaign: any compliance-minded company, which deals with personal data and sensitive information, can receive a free tool to make all data transfers, business communications and the level of corporate loyalty transparent and available for analysis and reporting.

The threat of critical information loss is growing day-by-day. Sometimes when there is no reliable protection against internal threats, confidential corporate data may fall into the hands of third parties, while a business may not have a clue about this. This happened to retail brokerage Scottrade which had suffered a leak of information affecting 4.6 million customers between late 2013 and early 2014.  It has become known only now, when federal authorities have notified Scottrade of this data breach.

The situation around such companies is constantly heating up: if a business is instantly aware of a leak and is able to make prompt investigation is one thing, but when a company finds out about a leak after a long period, it is a more serious issue with a long-term chain of painful consequences. Leaks of contact details, home and e-mail addresses, social security numbers of customers and partners, as well as commercial information about products, developments, financial reports and business plans turn out to be a disaster, which entails huge economic and reputational losses.

If businesses are not able to organize comprehensive information security system and thereby protect their own resources, how can they claim their trust of customers, partners and investors? Transparency is the key to successful management of corporate information and business environment.

However, the challenge is accepted, and Falcongaze, the vendor of integrated solutions for data loss prevention as well as optimization of work processes and protection of business against internal threats, in partnership with Bitrate announces the Information Security Action promo. Every company interested in getting a holistic view on sensitive information management, data travel and business communications within the corporate network can receive a full-featured version of Information Security and Operational Risks Management platform SecureTower. This is backed by technical support and assistance in deployment absolutely free of charge with no further obligations. All businesses interested in the Information Security Action promo are welcome to contact Bitrate for more information.

The campaign involves 30 days of SecureTower and related services at full disposal and is valid until February 1, 2016.

Bitrate is glad to announce one of Falcongaze’s latest threat detection

Reports about security incidents have become as common as weather forecasts. At the same time, there is a clear trend concerning the fact that the number of incidents involving employees is constantly growing. Insiders can cause much more serious damage than intruders outside the company can, just because they have much more opportunities to gain access to confidential data. The effects of such incidents, when sensitive information leaks to third parties, include financial losses, up to loss of intellectual property and business itself, reputational harm and loss of customer confidence. Growing popularity of social media also contributes much to security incidents – they provide lots of opportunities for criminals to find insiders and use them to access critical data, not to mention the fact that an employee may simply post some confidential information on their Twitter or Facebook account.

At the same time, according to the annual Verizon 2015 Data Breach Investigations Report, the reason for 55% of incidents was so-called privilege abuse, when the main source of information leakage were employees in whom a company had placed trust and who were given access to important corporate data with the expectation that these data will be used for the intended purpose only. Unfortunately, insiders, who are not controlled by security systems implemented into corporate network, tend to abuse the trust placed in them. Such employees have become the most cited perpetrators of cybercrime. Insider threats are more damaging and costly than incidents committed by outsiders. Yet many companies do not pay enough attention to the problem, do not have necessary security policies and tools to control privileged insiders, and are therefore not prepared to prevent, detect and manage incidents caused by them.

In fact, practice when activities of trusted employees (unlike the activities of their colleagues) are not monitored via security software turns out to lead to incidents when these employees sell confidential data to competitors, use it for their own interests, or, in the end of the day, harm the organization unwittingly, inadvertently sending sensitive info to the wrong email.

The problem also lies in the fact that most of modern conventional DLP software products are customized so that they do not actually analyze the activities, content and recipients of information transferred by employees who are trusted by their company. While information security and protection against internal threats software, such as Falcongaze SecureTower, solves this problem hitting right in the bull’s eye.

SecureTower captures and analyzes network traffic including e-mails with attachments, conversations and calls in IM, posts in social media, uploads and downloads from cloud storages, documents sent to USB devices and much more. All intercepted traffic and user activity data (records of user working time, the exact time spent by users on each website, applications launch and time of their active use and other indications of job contribution) are saved to a database, which makes it possible to investigate any incident in retrospective. Comprehensive information security system SecureTower allows to analyze corporate business processes and identify patterns that indicate a violation of the security policy, even if it is committed by an employee whose work with sensitive info is a part of everyday activity.

Use of SecureTower helps to protect a company from internal threats and give a confidence in its employees and in the future. After all, the proverb First try and then trust fits best for businesses of every kind.

Evaluation Based on Completeness of Vision and Ability to Execute

SAN JOSE, CALIF.– Nutanix, the next-generation enterprise computing company, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the “Magic Quadrant for Integrated Systems.” Nutanix believes this positioning is strong validation of its vision to make data center infrastructure invisible so IT professionals can focus on the applications and services that power their businesses.


Today, most business applications run on traditional data center infrastructure comprised of individual silos of server, storage and networking resources that are managed separately and scaled independently. These non-integrated architectures have increased data center complexity and slowed the overall pace of IT innovation.


The Nutanix Xtreme Computing Platform natively integrates compute, storage and virtualization into a Hyperconverged Integrated System that can run nearly any enterprise application, at any scale. Based on the principles of web-scale engineering and consumer-grade design, the Nutanix platform delivers uncompromising simplicity to data center managers so they can become true strategic partners to the business.


“Companies need to re-focus on the applications that drive their business, not the intricacies of the underlying infrastructure that powers those applications,” said Dheeraj Pandey, co-founder and CEO, Nutanix. “We consider our positioning in the Leaders Quadrant by Gartner confirmation of our unique vision for how the data center will evolve over the next several years, bringing cloud-like scalability, resiliency and agility that makes the infrastructure invisible to the business, and enables IT leaders to deliver real innovation to the organization.”


For more information on Nutanix and its commitment to providing customers with flexibility and choice within their data center infrastructure, please visit: http://go.nutanix.com/2015-gartner-magic-quadrant-integrated-systems.html


Gartner, Magic Quadrant for Integrated Systems, Andrew Butler, George J. Weiss, Philip Dawson, Stanley Zaffos, Errol Rasit, Hiroko Aoyama, 11 August 2015


Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


About Nutanix

Nutanix delivers invisible infrastructure for next-generation enterprise computing, elevating IT to focus on the applications and services that power their business. The company’s software-driven Xtreme Computing Platform natively converges compute, virtualization and storage into a single solution to drive simplicity in the datacenter. Using Nutanix, customers benefit from predictable performance, linear scalability and cloud-like infrastructure consumption. Learn more at www.nutanix.com or follow up on Twitter @nutanix.

About Bitrate

Through innovative products and technology, Bitrate provides solutions to the ICT industry focusing on Data centre infrastructure, IT monitoring, IT management and IT security. Bitrate distributes throughout Sub Sahara Africa. More information can be found by visiting the Bitrate Web site at www.bitrate.co.za

Eye On Networks July Edition
Welcome to the July edition of Eye On Networks. Here you will find industry relevant information for Network Professionals, with a goal of keeping you informed about industry and job related trends.  Let us know what you think by shooting us an email at flukenetworksinfo@flukenetworks.com
Upcoming Events, Webcasts and White papers
Events  - 30 July |  Versiv training Program |Networks Centre Training Academy, Horsham, West Sussex, UK  | 9am – 4.30pm | Register Now: +44 (0) 1403 754233+44 (0) 1403 754233
Recorded Webinars- How to obtain relevant and credible fiber test results| View Now
– Site Survey Best Practices| View Now
– Six Worst Network Troubleshooting Issues and How to Get Past Them| View Now
– Four Ways to Simplify Network Connectivity Testing and Documentation| View Now
– Network Troubleshooting: It’s more than packet capture| View Now
– The Structured Approach to Network Problem Solving| View Now
See Live Demo of OptiView XG|
View Now White Papers Fiber Standard-Compliant Certification| View Now
– Encircled Flux: An Insider’s Perspective” reprint| View Now
Reducing Costs Through More Effective Results Management| View Now
Cutting through the fog:The Need for Real-Time SaaS Visibility and Monitoring| View Now
Best Practices for Troubleshooting Remote Site Networks| View Now
How IT Can Take Control of the Borderless Enterprise| View Now

Resource Center:

- Versiv kit configurator More Info
– LinkWare live videos More Info
The CIO Brief:  A resource of brief insights focused on new approaches and technologies More Info 
– Gartner |  More Info
–  Network and Application Resource Center More Info

Datacom cabling
DTX-1800 Production Ends June 30th
The response to the new DSX-5000 and the Versiv family of products has been very strong since its launch in 2013. So much so, Fluke Networks will be ending production of the DTX-1800 on June 30th.. Read more
New Gold Membership Benefit: Lifetime Buyback Guarantee
Fluke Networks has a new Gold program benefit for copper and fiber datacom Gold customers – the Lifetime Buyback Guarantee.. Read more
Copper Certification Testing Best Practices Pocket Guide
The Copper Certification Testing Best Practices pocket guide was designed by Fluke Networks to help you maximize profitability whilst ensuring manufacturer warranty statements are promptly issued…Read more
IT Networking
Great Network Tools Aren’t Free… but Neither is Downtime
Network and application problems cost companies a ridiculous amount of time and money, and if they go unresolved, customer loyalty, brand reputation and public perception suffer..Read More
Politics, money, and network performance
If securing sufficient budget to support your IT organization feels like you’re maneuvering through a political mine field, it’s because you are..Read More 
Announcing TruView Live
More than 75% of Fortune 500 companies have begun to incorporate cloud-based services and SaaS applications into their day-to-day operations , some of them performing business-critical functionsRead More 
WLAN Analysis
Avoiding Honeypot APs: Who do you trust?
While rigorously validating server certificates is key to avoiding Honeypot APs and other man-in-the-middle attacks that may follow, this advice begs the question: How do you know which servers to trust?… Read more
Can WPA2-Enterprise stop Honeypot AP attacks?
Numerous demonstrations have proven that users easily fall prey to open Honeypot (aka Evil Twin) APs. … Read more
4 5 6
2 3


Falcongaze announced the start of cooperation with Bitrate, which is one of the leading suppliers of solutions for security, analysis and network monitoring in South Africa. The partnership agreement between the two companies was signed to expand geographical presence of Falcongaze in the international market. This will help ensure the security needs of South African businesses regarding Data Leakage Protection  are met.

The local network of any organization is like a body with lots of processes that are important to control in order to avoid economic and reputational losses. Bitrate, given the threats that lurk in corporate local network, the Internet and common communication channels, among other things, is engaged in supplying technical solutions designed to identify vulnerabilities and safeguard sensitive data.

Today the use of data leakage protection tools is in fact a prerequisite condition for companies that are committed to sustainable development and maintaining competitiveness in the changing external environment. The addition of Falcongaze SecureTower software will help our customers to deal with internal threats and ensure the security of sensitive data within a company’s network. SecureTower records and controls how sensitive data leave the network giving the CIO some peace that the enterprise is protected,” said Jeroen Dubbelman, Managing Director of Bitrate.

We seek to expand the markets for our software, and South Africa seems a promising region to us. The coalition with Bitrate is aimed at increasing of Falcongaze SecureTower brand awareness, as well as the expansion of the range of modern software solutions for business protection against internal threats in South Africa. We strongly believe that the collaboration will be successful and serve the common goals,” said Alexander Akimov, CEO of Falcongaze.

Eye on Networks: June Edition

Eye On Networks

Welcome to the June edition of Eye On Networks. Here you will find industry relevant information for Network Professionals, with a goal of keeping you informed about industry and job related trends.  Let us know what you think by shooting us an email at flukenetworksinfo@flukenetworks.com

Upcoming Events and Webcasts

Live Webinars
– 18 June at 10am BST – OneTouch 10Gb webinar in English | Register Now
–  30 June at 10am BST – XG webinar in English | Register Now
– 25 June at 10am CET – XG webinar in Dutch | Register Now
– 2 July at 10am CET – XG webinar  in French | Register Now

Recorded Webinars
– Answers to your top questions about network troubleshooting | View Now
– Live Demo of OptiView XG  | View Now
– Packet Analysis –From Wire to First Steps (Part 1) | View Now
– Packet Analysis – A Deeper Dive (Part 2)  | View Now

Borderless Enterprise Events – How are you managing it? 

- 8 June |  Partner Launch Event with new partners | Armani Hotel – Dubai | 9 – 17.00 | Register Now   | More Info
– 9 June |  Round Table for C-level Executives | Armani Hotel – Dubai | 10 – 13.30 |   More Info
- 10 June |  Half Day Seminar for IT Professionals | Armani Hotel – Dubai | 8.30 – 14.00 |  More Info
- 10 June |  Data Communications | informal presentation follow by BBQ |  More Info 
– 25 June |
Flow Communications | Seminar followd by rib boat ride on the Thames | London – UK | More Info 


IT Networking

Borderless Enterprise Launch
On May 19th, Fluke Networks launched its new solution framework – The Borderless Enterprise – with a number of new product launches including its first SaaS solution TruView Live. The core component of the Borderless Enterprise message is tied to the seismic shift of how new applications or services are being supplied. The traditional infrastructure-centric approach, where all new services started at the network and slowly built out internally, is being overrun by a plethora of options including SaaS, Cloud Platforms, BYOD and many more… Read more »

5 IT challenges for the Borderless Enterprise in 2015
The borderless enterprise will become a topic of increasing prevalence in 2015. This phenomenon is being driven by the adoption of cloud, mobile devices and wireless access…. Read more »

Borderless enterprises: the challenges it brings for IT

Tech Day’s Shannon Williams recently spoke with Bruce Kosbab, CTO of Fluke Networks, about the challenges facing IT when managing the ins and outs of the “borderless enterprise”…  Read more »

The Changing Role of Network Management

It’s impossible to read the trade press or attend a webinar these days and not be confronted with the fact that IT organizations are undergoing fundamental change. However, there is far less discussion about what those changes mean to network management…  Read more »


WLAN Analysis

What WLAN admins can learn from Starbucks
Earlier this week, reports surfaced about payment fraud attacks experienced by users of the Starbucks mobile app… Read more »

Are you vulnerable to the FREAK attack?
Last month, researchers in France discovered yet another gaping hole in SSL, dubbed the FREAK attack. FREAK is a downgrade vulnerability….  Read more »


Don’t fall into the “No iOS Zone”
In a recent RSA 2015 session entitled “Mobile Vulnerabilities: From Data Breach to Complete Shutdown,” the co-founders of Skycure took aim at iOS and its increasing number of network security vulnerabilities…  Read more »


Datacom Cabling       

Standards Update: The Four A’s of Harmonization
With ANSI/TIA being a North American standards body and ISO/IEC considered international, some often question why we need both, especially considering the similarities between the two…Read More

Fiber One Promo ends in 6 weeks. Last chance to save R 26 000

TRADE IN YOUR OLD FIBER Module set FOR A CERTIFIBER® PRO OPTICAL LOSS TEST SET…SAVE R 26 000 AND GET IT RIGHT THE FIRST TIME. For a limited time, your old fiber module set, any make, any model, is worth R 26 000 when you purchase a brand-new CertiFiber® Pro Optical Loss Test Module Set to be used with your DSX-5000 CableAnalyzerTM

Copper Certification Testing Best Practices Pocket Guide

The Copper Certification Testing Best Practices pocket guide was designed by Fluke Networks to help you maximize profitability whilst ensuring manufacturer warranty statements are promptly issued…Read More


    Free Fiber Testing Guide  Request a Free Evaluation  Managing the user experience

Partnership to help resellers maximize revenue opportunities through selling jetNEXUS advanced load balancing products.

jetNEXUS today announced it has appointed Bitrate as a distribution partner. The partnership with Bitrate will accelerate jetNEXUS’ growth in sub-Saharan Africa, while opening up significant new revenue streams for Bitrate’s resellers through the sale of advanced load balancing technology solutions.

jetNEXUS, in association with Bitrate, will run a formal, technical accreditation programme to on-board partners and help them better understand the technology and potential sales opportunities it offers. For a limited time only, partners will have access to free technical training.

It gives us great pleasure in inviting you and your team to the Technology Bazaar, an afternoon filled with exploring the datacentre and how to keep it clean with 3 international vendors all under one roof, namely: Palo Alto Networks, Nutanix and Fluke Networks. Bitrate drew on all its resources to host a spectacular cocktail afternoon for you to come indulge especially if your daily routine is to be IN or NEAR the datacentre.

Kindly accept our invitation by registering below.

Cisco Business Unit Manager
Cisco Business Unit Manager

Datacentrix, a complete ICT systems integrator that provides solutions and services across the full information value chain, has formed a strategic partnership with Bitrate to deliver award-winning network and application analysis, monitoring and troubleshooting solutions from Fluke Networks.

Fluke Networks, a Danaher Corporation-owned company, is a world leader in developing solutions that enable enterprises to gain comprehensive performance visibility across wired and wireless network infrastructure. The solutions are renowned for solving the toughest network and application performance issues.

“Too many enterprises spend their budgets blind-sighted on problems without knowing the root cause,” says Chris Pretorius, Cisco Business Unit Manager at Datacentrix. “We found an ease-of-use, benefit-rich, cost-effective solution that will support customers in accurate decision-making, and that will contribute to improving the business value of IT.”


Control it all with the new DSX-5000 CableAnalyzer
Member of the Versiv Cabling Certification Product Family

The new Versiv has been designed to accelerate every step on the path from project planning and instrument setup to system acceptance. Its revolutionary ProjX™ Management System puts you in control of up to 100 projects simultaneously. It is designed to get more jobs done first time right with less supervision. Thanks to ProjX the typical project and setup related problems that can seriously impact the profitability of a project, are prevented.


See the OptiView XG in action during live webinar hosted by Tony Fortunato, Senior Network Performance Specialist with The Technology Firm. Troubleshooting performance problems in today’s networks and data centers is only getting more complex. The growth of 10G links, virtualization, and cloud computing all bring their own analysis challenges. And the last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

The landscape of enterprise network infrastructures is undergoing a radical metamorphosis with mobility changing everything. A vast array of intelligent communication tools from smart phones to tablets is fuelling a BYOD culture that challenges the security policies and integrity of networked assets. Network and Security professionals are now facing a dilemma wanting to both enable the workforce to be as productive as possible for as long as possible, while still keeping the infrastructure and networked assets secure.


We invite you and your colleagues to attend our VSS Monitoring Seminar

What is Network Packet Brokering?1352122055_mikkopicture

Join Mikko Kiukkanen, VSS Monitoring EMEA Regional Sales Manager, to understand the differences between Network TAPS and Network Packet Brokers; as well as how to optimise  the effectiveness of your network security and performance tools while reducing costs.



By Kirk O’Connor – Sr. Product Manager- Managed Services – Visual Network Systems

Last night in Washington, DC, I was driving home in a severe thunderstorm that had blinding lightning flashes and thundering canon booms. Two weeks ago we had lost power for 5 days in my home during the sweltering, summer heat and it was not pleasant (understatement). I was worried about losing power at the house and after checking in via the mobile phone, my mind wandered back to the office and work. If I was losing power at home, how would this storm impact my company’s network? Would I return to the office with a lack of insight into what devices or applications were up or down, for how long, etc.? Then I smiled.

As the network environment expands and matures, simple aggregators are no longer able to handle the complex requirements that network monitoring and security solutions demand. Network Packet Brokers (NPBs), a newly defined category, are designed to work with both the existing and future monitoring and security solutions to ensure that they can optimally analyze and protect customer networks.


July 19, 2012 – Fluke Networks today announced the MultiFiber™ Pro Optical Power Meter and Light Source, the industry’s first MPO (Multi-Fiber Push On) fiber trunk tester that validates the performance of all 12 trunk fibers in a single test and reduces testing time by nearly 95 percent. MPO fiber trunks are the backbone for 10 Gbps, 40 Gbps and 100 Gbps high-speed data centers – the fastest growing segment in the industry.