If you work with fiber, you have likely experienced problems within a fiber link. There is a myriad of common problems, a connector that is not fully engaged, poor end-face geometry, poor field termination, defects or contamination, faulty fusion splice, poor cable management putting a strain on the connector, to name a few culprits that could cause fiber link problems.

Continue reading →

[Everett, Washington, 7 November 2018] Revolutionary Fluke Networks Versiv Platform user interface reduces cabling installation and maintenance costs by two-thirds.

Fluke Networks unveiled the OptiFiber Pro High Dynamic Range (HDR) Optical Time Domain Reflectometer, the first OTDR that fulfils contractors’, installers’ and network owners’ demands for a single solution to deal with applications ranging from FTTx, PON and data centres to category-rated structured cabling.

Versiv users report its efficient and familiar interface cuts costs by 65% when testing, certifying and maintaining copper and fibre network installations.

Continue reading →

[Santa Clara, California, 11 October 2018] Hillstone Networks, a leading provider of network security solutions, was included again today in Gartner’s Magic Quadrant for Unified Threat Management (UTM) for five consecutive years. Hillstone UTM solutions deliver complete security and networking services, tailored to meet the performance and value requirements for small and medium businesses as well as distributed enterprises.

“We believe our continued progression and acknowledgment in the Gartner Magic Quadrants validate our vision to protect our customers’ networks and critical assets,” said Lingling Zhang, Senior Vice-President of Product and Marketing from Hillstone Networks.

Continue reading →

[Johannesburg, 27 August 2018] Hyperconverged appliances simplify infrastructure installation, configuration and management, especially compared to traditional storage.

But that simplicity comes at a cost later. Ultimately, appliance-based solutions lead to much higher long-term costs, particularly compared to software-based solutions.

The drawbacks of a hyperconverged appliance include:

Vendor lock-in. Buying an appliance-based solution can lock you into the platform for the long-term, just like traditional storage array vendors.

Continue reading →

 

You asked and we listened. We have brought back this offer due to popular demand.

Due to the popularity of the Ultimate Field Technician Toolkit , the Netscout LinkSprinter & Fluke Networks CIQ Kit Combo is now available from Bitrate again.

The ultimate kit for any network field technician that can help save time, money and reputation with accurate cable diagnosis and full network connectivity out in the field. First test the cable and then prove to the end user that there is network connectivity. Use the reports to put your customer or end user at ease.

Why not make your life easier?

For more information click here.

Hillstone_section_proper_redux_400
Today, botnet protection requires more than just static signature based security protection. The modern botnet is essentially a collection of proxies and hosts that are the battleground for attackers and their malicious objectives.

The compromised systems are called “bots” and tied to a command and control (C&C) server. The C&C server is used by attackers to send out instructions for the bots to execute. Once controlling the C&C server, attackers can wreak havoc on an intranet by ultimately stealing data or running ransomware.

Continue reading →

it_security_awards
[Santa Clara, California, April 3, 2018] /PRNewswire/ — Hillstone Networks, a leading provider of network security solutions, announced today that Info Security Products Guide has named Server Breach Detection System (sBDS), a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in Most Innovative Security Product (Hardware) of the year; CloudView, a winner in Network Security and Management; and CloudEdge, a winner in Cloud Security.

Continue reading →

cybereye_logo_blue
[Tysons, Virginia and Johannesburg, South Africa, 28 March 2018] Cybreye, the leader in automated Penetration Testing and Security Assessments and Bitrate, the premier value-added-distributor of cyber security and ICT solutions in South Africa, today announced their strategic partnership and the availability of Cybreye’s services through Bitrate’s partner network of hundreds of companies across Sub-Saharan Africa.

Continue reading →

[Santa Clara, California and South Africa, 27 March 2018] Maxta software enables Bitrate channel partners throughout Sub-Sahara Africa to build differentiated solutions in hyperconverged infrastructure market.

Maxta, a leading provider of hyperconvergence software, today announced that Bitrate, a distributor of software, hardware and IT solutions throughout sub-Sahara Africa, has added Maxta hyperconvergence software to its portfolio of emerging and disruptive technological offerings. The addition of Maxta enables Bitrate reseller partners to help customers eliminate the capital and operational expense of legacy storage architectures with an innovative and differentiated hyperconverged solution.

Continue reading →

Perfect for Africa

I often get asked “What differentiates your solution from the competition?”

It’s a very fair question to ask which I think always should be answered in the context of the customer and their specific needs. Bitrate’s partners and customers are predominantly in Africa.

So, to answer this question in the context of our continent, we have to understand the many challenges customers in Africa face and have to successfully overcome.

 

Continue reading →

[Johannesburg, 15 March 2018] Ghanaian immigrant Abe Ankumah hadn’t worked on a computer until college – now he runs a data computing firm.

Nyansa tracks network data, allowing businesses to troubleshoot issues and improve performance on client devices.

It counts roughly 30 employees, recently raised $15 million in Series B funding, and has more than 300 000 devices under constant review.

Continue reading →

linkedin-_ad
 
[Tysons Cnr, Virginia & Johannesburg, 6 March 2018] Communication Security Group (CSG), the pioneer and leading provider of secure call and messaging solutions for mobile devices and desktops, and Bitrate, the premier value-added-distributor of cyber security and ICT solutions in South Africa, today announced their strategic partnership and the availability of CSG’s Seecrypt secure communications products through Bitrate’s partner network of hundreds of companies across sub-Sahara Africa.

 

Continue reading →

[San Jose, California, 27 February 2018] VIAVI Solutions evaluated for its completeness of vision and ability to execute.

VIAVI Solutions (NASDAQ: VIAV) has been named a Leader in the Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics for the fifth consecutive year. (1) In the Gartner report, VIAVI Solutions is again recognised as a Leader based on the company’s completeness of vision and ability to execute. (2)

Continue reading →

[Johannesburg, 24 January 2018] Hillstone Networks, a leading provider of network security solutions, today announced it has been named to Gartner’s 2018 Magic Quadrant for Intrusion Detection and Prevention Systems for the second year in a row.1 Hillstone Networks was also recognised in the 2017 Magic Quadrant for Unified Threat Management (SMB Multifunction)2 and 2017 Magic Quadrant for Enterprise Network Firewalls.

Continue reading →

Today organisations are increasingly dependent on the performance of their business applications – which, in turn, depend on the performance of their network. To keep the business running smoothly, the performance of both applications and the network must be maintained at the highest levels. The traditional approach has been to monitor network and application performance separately, using different systems run by different teams. However, the increasing interdependency of applications and networks mean that organisations need an integrated solution if they are to identify the source of any performance problems quickly and solve them before incurring costly downtime.

Continue reading →

“Cyber Security Is Not Just the Responsibility of the I.T. Department, It’s Everyone’s Responsibility.”
In recent years, coverage of Cyber Security incidents in the mainstream media has increased dramatically
to the point that it is now common for some form of incident to be reported on a daily basis. While the world
has no doubt become more aware of Cyber Security as a result of such reporting, the fact remains that Cyber
Criminals are using increasingly more complex and sophisticated mechanisms as part of their day-to-day
activities.

Download white paper

 

Hillstone Networks protects the networks of small to large enterprises with layered security

SUNNYVALE, Calif.–(BUSINESS WIRE)–Hillstone Networks, a leading provider of network firewall solutions, today announced it has been named to Gartner’s Magic Quadrant for Enterprise Network Firewalls* as well as the Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) for the fourth consecutive year.

Networks and critical assets need to be protected from multiple postures: server front, at the perimeter and in the cloud, for a layered security defense – this is what Hillstone delivers. Hillstone has broadened its approach from a network-centric security provider to one of layered protection offering solutions that protect and monitor at the perimeter, in the cloud down to the virtual machine, as well as the server front.

Continue reading →

SUNNYVALE, Calif.–(BUSINESS WIRE)–Hillstone Networks, a leading provider of network security solutions, announced today that Network Products Guide, industry’s leading technology research and advisory guide, has named Hillstone intelligent Next Generation Firewall (iNGFW) a Gold winner in the 12th Annual 2017 IT World Awards® in the Enterprise Network Firewall category, and Hillstone CloudHive a Gold winner in the Cloud Security category.

These industry and peer recognitions from Network Products Guide are the world’s premier information technology awards honoring achievements and recognitions in every facet of the IT industry. Winners from all over the world will be honored in San Francisco on Monday, June 26, 2017 during the 2017 SVUS Red Carpet Awards Ceremony Dinner in San Francisco.

Continue reading →

Everett, Wash. – June 12, 2017 – Fluke Networks is bringing increased productivity and enhanced ROI to small cable installation jobs with the addition of the DSX-600 CableAnalyzer – an affordably priced entry-level copper certifier. Designed to provide essential Category 6A and Class EA copper certification, the DSX-600 increases the efficiency of small electrical contractors who install and test copper networks.

Continue reading →

Bitrate, value added distributor of Network Monitoring and Security solutions in the Information Technology environment, is now representing Hillstone Networks in South Africa and Sub-Sahara Africa.

Hillstone Networks are recognized for their Intelligent Next Generation Firewalls and for their incredible performance on the NSS Labs Next Generation Firewall report. They achieved a NSS Labs recommended status with the best value per protected Mbps of all the tested Next Generation Firewalls.

“This value is what our customers are looking for in the market today” says Jeroen Dubbelman MD of Bitrate, “South Africa is experiencing very tough conditions economically and enterprises are constantly searching for a combination of quality and cost effectiveness.”

Continue reading →

data-protection-1 (002)

CyberRiskAware is delighted to announce the latest addition to its user security awareness training library with the launch of a Data Protection course dedicated to enabling South African companies achieve compliance with the Protection of Personal Information (PoPi) Act 2013.

The PoPi module increases our library to over 28 security topics for staff to enjoy and complements other regional Data Protection courses covering United States of America (HIPAA), United Kingdom (Data Protection Act) and Ireland (Data Protection Act and GDPR).

Continue reading →

Field testing of screened cabling systems has always required that the tester verify that there is continuity of the screen to the remote end of the test, however some field testers can incorrectly report screen continuity and fail to highlight potential problems with the cabling system. This article discusses the issues with measurements of screen continuity, how it can influence other cabling test parameters and how the Fluke Networks shield integrity approach can correctly assure compliance of cabling installations according to the Level 2G requirements of TIA 1152A

Download white paper

 

“Category 8 will play a major role in data centers and mission-critical environments upgrading to 25/40GBASE-T, says Mark Dearing, Senior Product Manager at Leviton.

“Cabling manufacturers are now engineering solutions with additional quality and flexibility to meet these demanding new applications. But even the most advanced infrastructure relies on high-quality installation practices to ensure the network will operate at its best. Proper testing and certification in the field translates to less chance of disruption, downtime, and unforeseen costs in the future.”

Download white paper

 

CyberRiskAware CEO Stephen Burke: Some 95% of security incidents are caused by human error.

Taking a “prevention is better than cure” approach to cybersecurity, Dublin start-up CyberRiskAware is targeting global markets with technology designed to train company staff to identify malicious emails and other cyber threats.

“Some 95% of security incidents are caused by human error’,’ said company founder and CEO Stephen Burke, saying that human error mainly involves the opening by staff of phishing emails containing ransomware, malware and fraudulent requests for money transfers, known as CEO fraud.

Continue reading →

FNET Field Agent XU49, we have new assignment for you. Proceed with this communique only if you can handle significant advantages.

Your mission
On 23rd of January 2017, at exactly 16.00 hrs. Central European time, you will log onto a special – super secret – webinar. One that has been created to give the casual observer the appearance of an ordinary Fluke Networks 25th Anniversary Global Celebration. Indeed, you may also think of it as ordinary – just like any other Fluke Networks 25th Anniversary Global Webinar. But you will know that this is just a facade, and you will know how to take advantage.
25th Ann

Continue reading →

AirCheck G2 allows frontline technicians to resolve 802.11ac problems quickly and efficiently

 WESTFORD, Mass. — May 17, 2016 — NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a market leader in service assurance and cybersecurity solutions, today launched the next generation of the AirCheck™ Handheld Wireless Tester. This industry-leading tool is available through NETSCOUT’s recently launched CONNECT360 global channel partner program, and includes important new enhancements, such as troubleshooting and diagnosing WiFi networks built using the increasingly adopted 802.11ac standard, access point backhaul testing, and free access to the Link-Live™ Cloud dashboard for more effective results management.

Continue reading →

Partnership Delivers Next Generation Data Center Solution to Help Customers Respond to Real-Time Needs with Efficiency and Operational Simplicity

South Africa — May 23, 2016 — Bitrate, a leading supplier of network analysis, infrastructure, security and maintenance equipment in South Africa, today announced a partnership with Stratoscale, the software company revolutionizing the data center, to deliver comprehensive, flexible and scalable data center cloud solutions to its customers.

Continue reading →

The adoption of an Information Security Policy is an obvious step for companies who care about their own well-being, it’s an integral part of governance to ensure the protection of business. Falcongaze Analytics Center highlights what it means and why it is essential.

An Information Security Policy outlines the main principles and general concept for the setting up information security at a particular organization. It should reflect the organizations goals for security and the approved strategy for securing data. When viewed in the narrow context, an Information Security Policy describes and regulates all business processes in terms of their security.

Continue reading →

Building a smart and effective information security infrastructure is quite a challenging task many companies cannot embrace to the full extent, which results in gaps in corporate security. You have installed an antivirus – and an employee has opened a link in a phishing email. You have set up a firewall – and a disloyal employee has emailed your Business Plan to competitors. You have implemented a DLP system – and a DDoS attack has shut your web services down. Because of the diversity of threats, companies need a comprehensive approach to the protection of information resources. Falcongaze Analytics Center compiled a list of preventive measures that will help to minimize risks, prevent leaks of confidential information and ensure the safety of business.

Continue reading →

This paper highlights the silo approach in which organizations tend to focus on a single issue within different groups, even if there may be huge implications across the entire organization ranging from the end user to the CEO. The performance management approach brings these disparate issues, views and groups together and focuses on providing a holistic view to improving overall performance of critical resources, applications and staff. This document will focus on key attributes and best practices for organizations looking to successfully deploy performance management strategy across their enterprise.

Download white paper

The IT network is at the heart of most enterprises, supporting business-critical applications, providing the data on which business decisions are made and facilitating communications with customers, partners, suppliers and co-workers. More than ever before, it is a strategic asset to the business, and any downtime or degradation in network or application performance will directly impact the organisation’s bottom line.

Continue reading →

Cooperation between Falcongaze and Bitrate has reached a new level. The companies announce the launch of a new joint campaign: any compliance-minded company, which deals with personal data and sensitive information, can receive a free tool to make all data transfers, business communications and the level of corporate loyalty transparent and available for analysis and reporting.

Continue reading →

Bitrate is glad to announce one of Falcongaze’s latest threat detection

Reports about security incidents have become as common as weather forecasts. At the same time, there is a clear trend concerning the fact that the number of incidents involving employees is constantly growing. Insiders can cause much more serious damage than intruders outside the company can, just because they have much more opportunities to gain access to confidential data.

Continue reading →

Evaluation Based on Completeness of Vision and Ability to Execute

SAN JOSE, CALIF.– Nutanix, the next-generation enterprise computing company, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the “Magic Quadrant for Integrated Systems.” Nutanix believes this positioning is strong validation of its vision to make data center infrastructure invisible so IT professionals can focus on the applications and services that power their businesses.

Continue reading →

End-face contamination is a leading cause of fiber failures in data center, campus and other enterprise or telecom networking environments. See how easy fiber inspection becomes with the IEC 61300-3-35 compliant Fiber Inspector from Fluke Networks.

As the industry moves to higher data speeds, more stringent loss budgets and new multi-fiber connectors, proactively inspecting and cleaning fiber end-faces is more important than ever to ensure network uptime, performance and equipment reliability. However, relying on subjective human inspection of fiber end-faces often produces inconsistent results.

Continue reading →

Falcongaze announced the start of cooperation with Bitrate, which is one of the leading suppliers of solutions for security, analysis and network monitoring in South Africa. The partnership agreement between the two companies was signed to expand geographical presence of Falcongaze in the international market. This will help ensure the security needs of South African businesses regarding Data Leakage Protection are met.

Continue reading →

Partnership to help resellers maximize revenue opportunities through selling jetNEXUS advanced load balancing products.

jetNEXUS today announced it has appointed Bitrate as a distribution partner. The partnership with Bitrate will accelerate jetNEXUS’ growth in sub-Saharan Africa, while opening up significant new revenue streams for Bitrate’s resellers through the sale of advanced load balancing technology solutions.

jetNEXUS, in association with Bitrate, will run a formal, technical accreditation programme to on-board partners and help them better understand the technology and potential sales opportunities it offers. For a limited time only, partners will have access to free technical training.

Continue reading →

It gives us great pleasure in inviting you and your team to the Technology Bazaar, an afternoon filled with exploring the datacentre and how to keep it clean with 3 international vendors all under one roof, namely: Palo Alto Networks, Nutanix and Fluke Networks. Bitrate drew on all its resources to host a spectacular cocktail afternoon for you to come indulge especially if your daily routine is to be IN or NEAR the datacentre.

Kindly accept our invitation by registering below.

Continue reading →

Cisco Business Unit Manager
Cisco Business Unit Manager
Datacentrix, a complete ICT systems integrator that provides solutions and services across the full information value chain, has formed a strategic partnership with Bitrate to deliver award-winning network and application analysis, monitoring and troubleshooting solutions from Fluke Networks.

Fluke Networks, a Danaher Corporation-owned company, is a world leader in developing solutions that enable enterprises to gain comprehensive performance visibility across wired and wireless network infrastructure. The solutions are renowned for solving the toughest network and application performance issues.

Continue reading →

There are discussions that we have with almost every customer we meet: evaluating the cost of performance degradation. Even if the cost is not obvious, after going through some simple steps, almost every customer realizes how big the operational loss induced by performance degradations is important. Here is a sample discussion we had with one of our customer, which could almost be any of our customers.

Continue reading →

Portfolio of Hillstone Perimeter Security Solutions

Hillstone Networks Intelligent Next-Generation Firewall Demo

Hillstone Elastic Firewall Architecture

Hillstone Server Breach Detection System

2017 Hillstone CloudHive Advanced Micro-segmentation Solution

Hillstone Intelligent Next Generation Firewall

FI-500 Fiber Optic Inspector

NETSCOUT’s OneTouch AT tests end-to-end path performance for wired and Wi-Fi networks in one tester

DSX 5000 CableAnalyzer™ – Setup: By Fluke Networks

SecureTower: reliable protection against insider threats

OTDR Testing Built for the Enterprise – OptiFiber Pro OTDR

MPO Fiber Testing – Optical Power Meter and Light Source

OTDR Testing – OptiFiber Pro OTDR Navigation Demo

Fluke Networks – Network On

banner

Control it all with the new DSX-5000 CableAnalyzer
Member of the Versiv Cabling Certification Product Family

The new Versiv has been designed to accelerate every step on the path from project planning and instrument setup to system acceptance. Its revolutionary ProjX™ Management System puts you in control of up to 100 projects simultaneously. It is designed to get more jobs done first time right with less supervision. Thanks to ProjX the typical project and setup related problems that can seriously impact the profitability of a project, are prevented.

Continue reading →

The health of your network depends on the quality of your network infrastructure — maintaining a reliable fiber plant is essential in protecting your business-critical applications. OTDRs are the tools of choice for maintaining and troubleshooting fiber LAN infrastructure – however choosing the right OTDR for your application can be challenging.

Continue reading →

Optiview

See the OptiView XG in action during live webinar hosted by Tony Fortunato, Senior Network Performance Specialist with The Technology Firm. Troubleshooting performance problems in today’s networks and data centers is only getting more complex. The growth of 10G links, virtualization, and cloud computing all bring their own analysis challenges. And the last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

Continue reading →

When users get frustrated with the performance of an application, it’s often difficult to isolate whether the cause of performance degradation is coming from the client, the servers, the network, or the behavior of the application itself. This on-demand webinar will walk you through the 5 steps to successful application troubleshooting so you can quickly resolve problems and end the finger pointing between your application developers and your IT staff.

Continue reading →

Session-based / Flow-aware Load Balancing increases user control of traffic distribution amongst multiple monitoring tools, increasing output capacity while maintaining session integrity. Packets from a unique session flow will be balanced to the same tool port, always, using up to 10 balancing criteria, e.g. source and / or destination MAC address, EtherType, IP address, TCP/UDP port, and GTP TEID. Standard Load Balancing allows users to balance traffic based on up to ten criteria.

Continue reading →

We invite you and your colleagues to attend our VSS Monitoring Seminar

What is Network Packet Brokering?1352122055_mikkopicture

Join Mikko Kiukkanen, VSS Monitoring EMEA Regional Sales Manager, to understand the differences between Network TAPS and Network Packet Brokers; as well as how to optimise  the effectiveness of your network security and performance tools while reducing costs.

 

 

Continue reading →

VSS Monitoring Uniquely Defends Against Today’s Advanced Cyber-Attacks and Scales for Big Mobile Data Explosion with New Network Packet Broker Platforms

Cyber Attacks in South Korea, Saudi Arabia and Russia Highlight Major Gaps in Today’s Security, While Mobile Operators Struggle to Gain Visibility into Rapidly Expanding LTE Traffic

Continue reading →

By Kirk O’Connor – Sr. Product Manager- Managed Services – Visual Network Systems

Last night in Washington, DC, I was driving home in a severe thunderstorm that had blinding lightning flashes and thundering canon booms. Two weeks ago we had lost power for 5 days in my home during the sweltering, summer heat and it was not pleasant (understatement). I was worried about losing power at the house and after checking in via the mobile phone, my mind wandered back to the office and work. If I was losing power at home, how would this storm impact my company’s network? Would I return to the office with a lack of insight into what devices or applications were up or down, for how long, etc.? Then I smiled.

Continue reading →

As the network environment expands and matures, simple aggregators are no longer able to handle the complex requirements that network monitoring and security solutions demand. Network Packet Brokers (NPBs), a newly defined category, are designed to work with both the existing and future monitoring and security solutions to ensure that they can optimally analyze and protect customer networks.

download

Continue reading →

July 19, 2012 – Fluke Networks today announced the MultiFiber™ Pro Optical Power Meter and Light Source, the industry’s first MPO (Multi-Fiber Push On) fiber trunk tester that validates the performance of all 12 trunk fibers in a single test and reduces testing time by nearly 95 percent. MPO fiber trunks are the backbone for 10 Gbps, 40 Gbps and 100 Gbps high-speed data centers – the fastest growing segment in the industry.

Continue reading →