We Help You Stay Ahead of the Hack

World Leading Partners in IT Security
Threat Defense.jpg

ThreatDefence

ThreatDefence is a Unified Security Management Platform with Managed Detection and Response Service

Intuitive, Affordable, Scalable - deploys in minutes.

While similar solutions require months of configuration by security experts, ThreatDefence is like a Security Operations Centre in a box.

It works as soon as you plug it into your network, INSTANTLY giving you visibility across all the vulnerabilities, threats, anomalies and attacks on your network, in REAL TIME.

With this comprehensive security tool, you can monitor your network 24x7, as well as analyse and report on the security of all of your devices.

Catch attacks and intrusions as they occur, allowing you to secure your networks against cyber-attacks and security incidents that could comprise your environment.

The ThreatDefence solution consists of three independent services: Detection, Analysis and Remediation. You can select any or all of the services that suit your business.

ThreatDefence can be deployed either as an on premise or fully managed service, both deployments can be customised to meet your requirements. Click here for more information.

Read more...

15 Ways To Protect Your Business From a Cyber Attack

 

Layer 8 Security

75% of all cyber security breaches are the result of Human Error.

 

Humans are the frontline of defence for Cyber Security, you can’t replace Human Intuition and Insight.

SoftGen is teaming with Layer 8 Security to offer a complete suite of Cyber Security Awareness Programs that leverage progressive training techniques to effectively improve human response against cyber-attacks.

The Layer 8 Security, Cyber Security Awareness programs are the most advanced in the world, most of our programs are undertaken online and focus on short fun experiences to ensure the short courses achieve the maximum benefits for our customers.

All Layer 8 programs are customisable and can include an Assessment and a dedicated Education program.

These programs are suitable for organizations of all sizes from 10 to thousands of employees.

Interactive cyber security awareness training methods help users absorb and appropriately recall the knowledge and tactics necessary to be aware of the tactics used by cyber criminals and then subsequently, avoid the attack.

 

"Tell me and I forget

Teach me and I may remember

Involve me and I learn"

- Benjamin Franklin

We know the value of a balanced, thoughtful approach that draws on proven principles. That’s why our framework, which employs a cyclical model of assessment, reinforcement, and measurement, has helped our customers change behaviours within their organisations and reduce the effects from cyber criminals, malware infections and successful phishing attacks by up to 90%

For more information click here

Click on the video to learn more

Layer 8 Security.jpg
 
Rapid 7.jpg

Rapid 7

In these rapidly changing times, you shouldn’t have to worry about your security program. Rapid7 is here to help you reduce risk across your entire connected environment so your company can focus on what matters most. Whether you need to easily manage vulnerabilities, monitor for malicious behaviour, investigate and shut down attacks, or automate your operations — we have solutions and guidance for you.

Click on the video and learn more

 

VIPRE - Endpoint

Mission #1 for your endpoint security solution is stopping malware and VIPRE

Endpoint Security accomplishes this through next-generation scanning technology, always-on Advanced Active Protection, heuristics, signatures and other sophisticated detection methods.

 

The most comprehensive endpoint security solution for known and unknown threats with leading technology like cloud-enabled Advanced Active Protection to help prevent ransomware infections, Advanced Browser Protection, removable device control and encryption, and more. Plus, VIPRE Endpoint Security software still manages to work quicker than ever without slowing down PCs.

 

VIPRE End Point protection offers flexibility by offering deployment options:

VIPRE Endpoint Cloud Edition

Provides the highest-rated malware protection at the best value in the industry. Powered by next-generation advanced machine learning, one of the world’s largest threat intelligence clouds. With real-time behaviour analysis, VIPRE Cloud protects against ransomware, zero-day attacks, phishing attacks and other malware.

Read more...

Start a Trial

Watch the video below and learn more

VIPRE Endpoint Web Access Control

A VIPRE Endpoint Cloud Add-on

Protects your organisations from web-based threats. Gives you control over what your employees do online and protects your organisation from web-based threats.

 

Enforce web usage policies for all users regardless of location. An easy to use central management console lets you define your usage polices that can be applied to your entire organisation, specific teams or individuals, regardless of where your users are located.

 

VIPRE Web Security sits between your users and the internet, inspecting every byte of traffic across multiple security techniques, even within SSL.

Read more...

VIPRE Endpoint Server Edition

Secure your endpoints, email servers, virtual environments and mobile devices from emerging threats like viruses, Trojans, rootkits, exploits, spyware, malicious websites, phishing attacks and more.

 

Read more...

Start a Trial

View Cloud and Server Comparison Matrix

VIPRE Endpoint.jpg
 

VIPRE - Security Awareness Training

VIPRE Security Awareness Training (SAT) is an easy to use, cloud based learning solution that builds practical, cost effective security awareness for an organisations employees.

The content featured in each VIPRE SAT course has been developed to teach users to keep security top of mind in everything they do and to empower them to be the best defence of their company’s cyber security infrastructure.

Choose from Essentials, Advanced or Enterprise packages that best fit your organisation’s needs.

VIPRE (SAT) provides an automated deployment with Integrated Phishing and Enterprise quality content for organisations of all sizes.

Read more...

Click on the video below to learn more

VIPRE - Security Awareness Training.jpg
Team Meeting

VIPRE Site Manager

VIPRE Site Manager, is purpose built advanced end point protection that provides MSPs a full-featured endpoint security solution with a centralized multi-tenant management portal for visibility across an entire client-base.

Site Manager protects at the file, application and network layer, combining multiple layers of security with network- and application-agnostic DNS protection at no additional cost.

Client level reporting helps deliver greater value to your customers. Save time and reduce impact on resources with automated processes and malware determinations. Stay organised with simple monthly utility billing with provider usage reports. Demonstrate service value by delivering regular threat report summaries to clients.

Read more...

VIPRE Email Security.jpg

VIPRE - Email Security

Virtually ALL organisations large and small, rely on email as the primary business application for communicating both internally and externally.

Most organisations employ a basic form of email scanning backed up by an endpoint security solution. Unfortunately, with today's complex security climate, passive scanning is not enough protection.

VIPRE offers layered email security solutions to combat today's worst malware threats, offering the latest in machine learning technology.

VIPRE's unique modular architecture of VIPRE Email Security allows businesses to choose the exact components needed to provide maximum email security in any specific environment both today and when future threats emerge.

Read more about VIPRE Email Security Cloud

Read more about VIPRE Email Security Server

 

More information on VIPRE Email Security Cloud Add-on 

VIPRE Email Security Cloud

(with Advanced Threat Protection)

VIPRE Email Security Cloud – with Advanced Threat Protection (ATP) offers enterprise-grade email protection in an easy to use, out of the box package. VIPRE ATP defends end users against the newest most sophisticated strains of malware, weaponised attachments and phishing techniques that evade traditional detection.

Often seen as easy targets, criminals prey on small and medium-sized businesses while leveraging advanced techniques to bypass traditional security.

VIPRE ATP is perfect for SMB’s challenge with limited IT resources.

Read more...

VIPRE Endpoint Web Access Control.jpg
VIPRE Send Safe.jpg

VIPRE Send Safe

Prevent sensitive emails from being sent to the wrong person.

Have you ever mistakenly sent an email to the wrong person? VIPRE SafeSend is an Outlook add-in that prevents misaddressed email. It requires users to confirm external recipients and attachments to prevent inadvertent autocomplete email mistakes.

All settings in SafeSend are configurable using Windows Group Policy and can be specified on a per-group basis.

 

You can also add DLP functionality to automatically scan outgoing emails and attachments to ensure sensitive data does not leave your organisation.

 

Corporate branding (including your logo) and the ability to include custom text with a link to your email/security policy, your users will be reminded that your organisation cares deeply about security.

Read more...

Click on the video to learn more

VIPRE Encrypt.team

VIPRE Encrypt.team is an easy to manage, cloud based VPN and the secure way to protect employees from online threats while working remotely or on-the-go. A VPN helps protect against hackers seeking to steal credentials, data, information and intellectual property.

Public and untrusted Wi-Fi networks are unsafe, but VPN provides a layer of protection between an employee’s devices and other nearby devices as well as the internet at large.

 

Compatible across several platforms including Windows, MacOS, iOS, Android and Amazon FireOS.

Read more...

Computer Class
GFI Kerio Control.jpg

GFI Kerio Control 

Unified Threat Management

Kerio Control keeps networks, users and assets safe and secure with a powerful all-in-one security solution. Kerio’s NG series of hardware appliances combine Kerio’s award winning Kerio Control software with specially matched hardware to create a complete network security solution for small to mid-sized organisations. Hardware appliances arrive with the latest version of Kerio Control software and use the same proprietary Linux-based operating system found in the software appliance. Kerio Control hardware appliances bundle all of Kerio’s available security technologies including Kerio Antivirus and Kerio Control Web Filter w/ application awareness.

Kerio Control – forms part of the “GFI Unlimited Network Security” package – ALL for one value based price you only pay for one Single Subscription.

Read more...

Related articles: GFI  KerioControl White Paper

Click on the video to learn more

 

GFI MailEssentials

With billions of emails sent and received each day, email is frequently an intruder’s means to attack your organisation. GFI MailEssentials is-easy-to-use and offers a comprehensive set of defenses to protect your company and improve email productivity

 

GFI MailEssentials protects your email network against viruses and other malware threats using advanced email filtering technologies, with 14 anti-spam filters and 4 anti-virus engines.

 

With a spam capture rate of over 99% and minimal false positives, IT Administrators can be rest assured that company email is secure and spam-free.

 

GFI MailEssentials puts control in the hands of the administrator and user, with a central web-based email management dashboard, and email reporting tools.

GFI Essentials is now offered as part of GFI Unlimited program, offering multilayered security for SMB’s needed to prevent, detect and remediate threats from entering your network. GFI Essentials can be deployed as part of either Unlimited Network Security or Unlimited Secure Email.

 

GFI MailEssentails – forms part of both the “GFI Unlimited Secure Email” and “GFI Unlimited Network Security” – ALL for one value based price you only pay for one Single Subscription.

Read more ...

GFI MailEssentials.jpg
GFI LanGuard.jpg

GFI LanGuard

GFI LanGuard is a network security scanner and patch management tool that provides network mapping and risk analysis. You install the software on a single Windows machine, which then scans the network to discover all devices (servers, workstations, laptops, mobile devices, virtual machines, routers, switches, and printers) and interrogate them regarding security issues. Once discovered, the devices can be managed with or without an agent; using an agent will give IT administrators deeper results. While no security tool is a silver bullet, GFI LanGuard is attractive because it's notably more mature than many security tools popping on the market and so has a feature depth you won't find in many other platforms.

 

In addition, it enables complete Patch Management of security and non-security patches to Microsoft operating systems, MAC OS X, major Linux distributions and third party applications. It can also automate patching for all major web browsers.

GFI LanGuard – forms part of the “GFI Unlimited Network Security” package – ALL for one value based price you only pay for one Single Subscription.

Read more...

Click on the video to learn more

 
 

Kerio Connect

An award winning, messaging and collaboration solution.

 

Looking for an Enterprise Class security solution for Email, Calendar and Instant Messaging, that meets the needs of small and mid-sized businesses.

 

Kerio Connect is a  web-based administration console rapid deployment in any IT environment whether cloud, on-premises or virtualized Secure mobile support for a wide range of devices—from iPhones and Android phones to tablets

 

Kerio Connect provides:

  • Cross Platform Support

Full support for Outlook (Windows and Mac), native apps for Mac, and any other IMAP or POP compliant email clients.

 

  • Protection

For email users and the network with security features such as SSL encryption, S/MIME and powerful antivirus and anti-spam tools

 

  • Intuitive

Anytime, anywhere administration through the Kerio Connect web-based administration console.

 

  • Rapid Deployment

In any IT environment whether cloud, on-premises or virtualised

 

  • Secure Mobile

Support for a wide range of devices from iPhones and Android Phones to tablets

 

  • Free Migration Tools

Leverage free migration tools to move quickly and easily from Exchange, IMAP and any other environment

 

Kerio Connect is now offered as part of GFI Unlimited program, offering multilayered security for SMB’s needed to prevent,detect and remediate threats from entering your network. Kerio Connect can be deployed as part of Unlimited Secure Email.

 

Kerio Connect – forms part of the “GFI Unlimited Secure Email” package – ALL for one value based price you only pay for one Single Subscription.

Read more...

Working with Laptop

GFI Archiver

Your corporate email and files are critical sources of information, communication, transactions and business intelligence. If any of this gets lost or deleted, it can lead to a loss of business and credibility, and also place your company at legal risk.

 

Businesses gain peace of mind knowing their vital company information is stored in a safe and manageable place. Furthermore, with MailInsights® reports you can identify and resolve potential business issues such as security breaches, legal risks and productivity issues by extracting key data from your archive.*

 

GFI Archiver - not just for email

 

  • GFI Archiver provides a safe secure tamper proof archive with easy to access storage that enables you to secure and analyse sensitive information locally

 

  • GFI Archiver works in parallel with Microsoft® Exchange, Office 365™, Google Apps™ and other email servers to copy all emails that are sent and received in a separate server.

 

  • You can archive, store and search copies of internal and external email flows, files and calendar entries in one central secure location.

 

  • This enables you to create space on your email server to increase performance, while providing excellent scalability and reliability for your archive store.

 

  • Instant access anytime, anywhere to business critical emails and their attachments via Outlook, laptop, smartphone and tablet.

 

  • Avoid security breaches and manage employee productivity with maillinsights reporting

 

  • Provides mobile access, audit trails and is tamper proof

 

  • GFI Archiver has changed the license model to a Subscription Service Product

GFI Archiver - forms part of the “GFI Unlimited Secure Email” Solution – ALL for one Value-Based price you only pay for one Single Subscription

Read more...

Cyberoam

Identity based network security

Cyberoam's identity based network security has changed the rules of the security game. Now you can have centralised security across distributed networks. You can log and report network activity to provide higher levels of security, data confidentiality and regulatory compliance. 

Cyberoam.jpg
 
Actiance.jpg

Actiance

Actiance enables the safe and productive use of Unified Communications, collaboration and Web 2.0, including blogs and social networking sites. Formerly FaceTime Communications, Actiance’s award-winning platforms are used by 9 of the top 10 US banks and more than 1600 organizations globally for the security, management and compliance of unified communications, Web 2.0 and social media channels. Actiance supports all leading social networks, unified communications providers and IM platforms, including Facebook, LinkedIn, Twitter, AOL, Google, Yahoo!, Skype, Microsoft, IBM and Cisco.

Read more...

Click on the video to learn more

 

Acunetix

Acunetix are the pioneers in automated web application security testing using innovative technologies.

 

The Acunetix Web Vulnerability Scanner (WVS) crawls your website, it automatically analyzes your web applications and finds perilous SQL injection, Cross-Site scripting and other vulnerabilities that expose your online business. Concise reports identify where web apps need to be fixed, thus enabling you to protect your business from impending hacker attacks!

 

As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data. Credit card information, customer lists, personal health information, student records and intellectual property are all high priority targets.

Hackers concentrate their efforts on web-based applications – shopping carts, forms, login pages, dynamic content and so on because they are lucrative targets. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.

 

Acunetix Web Vulnerability Scanner helps you audit your website and as a result, uncover vulnerabilities hackers could use to compromise your sensitive data.

​​

Firewalls, SSL and Locked-Down Servers Are Futile Against Web Application Hacking.

 

Web application attacks go straight through the firewall, past the operating system and network level security.  They get right into the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and hence, are easy prey for hackers.

Find out if your website is secure before hackers do.

Read more...

Click on the videos to leanr more

Acunetix (2).jpg
Acunetix.png
 
Embarcadero.jpg

Embarcadero

Leading the Way in Innovative Developer and Database Solutions - RAD Studio, Delphi, C++ Builder

With the explosion of innovations in software and database development tools, methods, and processes, it can be daunting to keep up with the changes. And, it's not just keeping up with the many database platforms. "Keeping up" means creating Web apps to run your business more efficiently. It means ensuring that your code is streamlined and does what it was written to do. Chances are your users demand even more functionality and ease of use than ever before. You need flexible, high-productivity development and database tools to solve today's toughest IT application challenges.

Click on video to learn more.