SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
TORNADO TECHNOLOGY
                                                           MISSION
                                                    TORNADO was set to provide
                                                    easy access to performance
                                                    and efficiency for the
                                                    Romanian market, offering its
                                                    business partners a strong,
                                                    long term relationship based
                                                    on trust.




                           VALUES
                     We build our company
                     guided by cornerstone
                     values in which we believe.
                     Our desire is to bring added
                     value both to our business
                     and relationship between
                     our companies.




                       2
l Professionalism and
                                                 Performance: We invest in
                                                 the personal and professional
                                                 development of our
                                                 employees, enlarging our
                                                 ability to motivate, to inspire
           l Integrity and Consistency:          and bring them to a higher
             We are committed to                 level of involvement and
             maintaining a trustworthy           responsibility.
             relationship, direct approach,
             fairness and honesty in any
             situation.
                                                     l Initiative and innovation:
WE BELIVE IN:                                        We encourage imagination and
                                                     initiative in suggesting new
                 l Communication and                 things, creating and bringing
                   Feedback: We ask questions;       novelty to the products, service
                   search for feedback; make         and relationship we provide.
                   recommendations because
                   only by communicating we
                   will acknowledge each other’s
                   expectations, share experience




                                                                                            TECHNOLOGY CENTER
                   and reach our goals.




                                                                                        3
TECHNOLOGY CENTER



                        The TECHNOLOGY CENTER is designed to offer a professional environment
                        to deliver IT networking and security knowledge according to our vendors’
                        requirements and enable the partners to implement value added solutions
                        to end customers.




                                                    The certification training courses are offering a competitive edge to our
                    4                               partners over competition, enabling them to secure the projects and to
                                                    increase their profitability.
We provide in our TECHNOLOGY CENTER a wide range of
accredited trainings:

l Avira                   - antivirus technologies;
l Barracuda               - firewall, antispam, load balancing, link balancer, web
                            content filtering
l BlockMaster             - secure USB solutions
l Brand Rex               - communication infrastructure cabling solutions
l Cryptzone               - encryption technologies
l Enterasys               - switching, routing, wireless and management and
                            security
l Entrust                 - identity access management
l Extreme Networks        - switching and wireless
l Huawei                  - switching, routing, unified communication, VOIP,
                            servers and storage, security, wimax;
l Ipoque                  - traffic management
l LanDesk                 - systems and security management: capturing
                            inventory, remote control, software distribution,
                            deploying patches, and working with Operating
                          System Deployment and Provisioning




                                                                                     TECHNOLOGY CENTER
l   LogLogic            - log management and business continuity
l   PixAlert            - data protection and illicit image detection
l   Rapid7              - vulnerability management and penetration testing
l   SonicWall           - firewall, antispam, load balancing, web content
                        filtering and data back-up
l   Transition Networks - industrial switching and media conversion
                        technologies
l   WatchGuard          - Unified Threat Management (XTM) technologies:
                        firewall, antivirus, antispam, IPS, load balancing, web
                        content filtering, application control, VOIP security,
                        Reputation Enabled Defense;
                        - content security (XCS) technologies: antivirus,
                        antispam, IPS, web content
                        filtering, application control,
                        Data Loss Prevention,
l   Zyxel               - switching and routing,
                        wireless, security, VOIP, fiber
                        access, wimax, media servers,                    5
                        network management
PORTOFOLIO




                 Tornado Technology delivers a wide range of products and
                 technologies that recommends us a strategic provider for
                 networking and IT Security solutions.

                 Networking
                 Brand-Rex is a British supplier of structured cabling systems for offices and
                 datacenters: copper and fiber optic cables, patchpanels, high density cabinets, patch
                 cords and wall outlets seen.

                 Enterasys Networks, a Siemens Enterprise Communications Company, is a premier
                 global provider of wired (switching & routing) and wireless (access points &
                 controllers) network infrastructure and security management solutions (Security
                 Information & Event Manager - SIEM).

                 Extreme Networks offers Core and Aggregation switching, Wireless, Mobile Backhaul
                 products, Port Extenders, Security & Management Tools.

                 Huawei is a strategic supplier of mobile telecommunications infrastructure with
                 three core business segments: Telecom Networks, building telecommunications
                 networks; Global Services, offering global equipment, operational services, and
                 consulting services for enterprise customers; and Devices, manufacturing electronic
                 communications devices. Huawei delivers for Enterprise business network
                 infrastructure, fixed and wireless communication, data center and cloud computing.

                 Qubs is the first romanian networking Brand, launched in 2002 by Tornado. Qubs
                 product portfolio includes copper cables and patch cords, wall outlets and
                 connectors, metallic cabinets (Racks) & copper Patch Panels.

                                                           Transition Networks delivers a wide range
                                                           of Media Conversion, Switching, Connectivity,
                                                           Aggregation switches for enterprise and
                                                           industrial applications.

                                                           ZyXEL offers complete networking solutions
                                                           ranging from DSL customer premise
                                                           equipment, central office equipment, Internet
                                                           security appliances, switches, WLAN
                                                           equipment; network attached storage (NAS)
                                                           and centralized network management systems.


                 IT Security
                 Avira , offers antivirus professional solutions for workstations, file, mail and web
                 servers for Windows/Linux/Unix operating systems.
             6
Barracuda offers products that protect organizations from threats over email, Web, and
InstantMesseging and loadbalancing/link balancing solutions.

Coperfasten (WebTitan/SpamTitan) offers comprehensive protection from email and web
based threats, including , viruses, Trojans, phishing, malware and other unwanted content

Cryptzone offers Policy Compliance, Content Security, Secure Access and Endpoint
Security products

Entrust solutions include strong authentication, fraud detection, digital certificates, SSL
and PKI.

Ipoque, provides deep packet inspection (DPI), bandwidth management, copyright
protection, QoS solutions for Internet traffic management and analysis.

LANDesk provides systems management, security management, service management,
asset management, and process management solutions to organizations.

Loglogic provides compliance (PCI, HIPAA, FISMA, ISO, ITIL, NERC & SO) and IT data
management products




                                                                                                     PORTOFOLIO
Pixalert has innovative and advanced portfolio of critical data and image detection and
protection software solutions.

Rapid7 is the leading provider of Unified Vulnerability Management and Penetration
Testing Solutions.

SonicWALL providing services for network firewalls, UTMs (Unified Threat Management),
VPNs (Virtual Private Network), backup and recovery, and anti-spam for email.

Watchguard offers antivirus, antispam, IPS, firewall, VPN, application control, VoIP security,
Reputation Enabled Defence, Data Loss Prevention device solutions

Webroot offer SaaS products (web/email security service, email archiving) and endpoint
security software

Block master offers secure USB flash drivers, encryption data USB AND central USB
management products
                                                                                                 7
NETWORKING




             Brand Rex is Europe’s leading supplier of communication infrastructure cabling solutions, a niche provider of
             extreme environment speciality cabling solutions, that design, develop, manufacture and support copper &
             fibre cable and connectivity systems.



                                     Copper Cabling Systems

                                     Cat 5e, Cat 6, Cat 6A, Cat 7 and Cat7A advanced end-to-end cabling systems




             Fibre Cabling Systems

             Solutions for conventional cabling, centralised
             fibre installations and telecom / local networks; full
             range of premise distribution and loose tube fibre
             optic cables; complete system includes fibre
             connectivity, adaptors, patch cords and panels;
             Unique Air Blown Fibre System allowing networks
             to be easily and cost-effectively upgraded.


             Data Centre Solutions

             High Density Copper and Fibre Cabling Solutions
             Unique Data Centre Solutions designed with an
             emphasis on:
             l minimising installation times
             l maximising precious usable data centre space
             l minimising footprint
                                                                            Intelligent Infrastructure

                                                                            SmartPatch Intelligent Infrastructure
                                                                            Management System
                                                                            Maximises network service availability and
                                                                            efficiency
              8
                                                                            Enhances network security through
                                                                            identification and isolation of unauthorised
                                                                            users
Reliable, Innovative and
Customer-Focused

Enterasys Networks, a Siemens Enterprise
Communications Company, is a premier
global provider of wired and wireless
network infrastructure and security solutions.
Our solutions enable organizations to drive
down IT costs while improving business
productivity and efficiency through a unique
combination of automation, visibility and
control capabilities. Enterasys provides a
broad range of enterprise networking and
security solutions by technology and             Enterasys has a rich history as a pioneer in the switching and
industry.                                        routing market, dating back to 1998. Today's full portfolio of
                                                 wired/wireless network infrastructure and security solutions
                                                 leverages that experience and a robust technology patent
                                                 portfolio to provide built-in automation, visibility and control
                                                 capabilities to solve critical customer networking and
                                                 mobility challenges.


                                                 The company designs and manufactures all types of




                                                                                                                    NETWORKING
                                                 networking equipment including routers, switches, and
                                                 802.11 wireless access points and controllers.
                                                 In addition to hardware, the company also builds software for
                                                 managing and securing enterprise-class networks such as
                                                 Intrusion Prevention System, Network Access Control and
                                                 Security Information & Event Management (SIEM).


 Product
 categories        switching and routing             chassis
                                                     stackable
                                                     standalone
                                                     accessories
                   wireless                          access points
                                                     controllers
                                                     management
                   security                          network management                               9
                                                     advanced security
                                                     applications
NETWORKING




             Extreme Networks is a leader in providing enterprise and metro service solutions for open converged
             networks.
             Extreme Networks vision of a converged network is one where voice, video, data, and diverse applications and
             services come together in the same network.


             Extreme Networks are proud to be
             among one of the first companies
             to:
             l Introduce Gigabit Ethernet
               products that were tested at full
               wire-speed with zero packet loss
             l Offer patented quality of service
               (QoS) capability on IP/Ethernet
               networks
             l Deliver carrier-class Ethernet for
               metro area networks
             l Deliver a unified solution that               Switching Products
               allows wired and wireless                     Core and aggregation switching solutions scale to solve tough voice
               devices, applications and                     and security challenges with high availability, crystal clarity, and
               equipment to share the same                   integrated security features. Edge switching solutions provide a
               infrastructure and management                 powerful portfolio to support everything from basic connectivity to
               tools                                         advanced, high-speed services for demanding desktop applications.
             l Deliver a truly modular
               switching operating system for                Mobile Backhaul Products
               enterprises and metro service                 Extreme Networks E4G family enables mobile operators to deploy a
               providers                                     true 4G mobile backhaul network to address the current requirements
             l Introduce a voice-class modular               of 2G and 3G services while laying the foundation for a true 4G mobile
               switch for the network edge                   broadband network through three key capabilities --- synchronization,
                                                             resiliency and performance.


                                                             Wireless Products
                                                             Scalable wireless LAN solutions are available for small to medium to
                                                             large enterprises. Extreme Networks wireless solutions offers world
                                                             class capabilities including comprehensive network-wide security,
                                                             enterprise grade voice services and unified policies and services across
                                                             wired and wireless networks. We enable the enterprise customer to
                                                             reduce the complexity for wireless network deployment and
                                                             management.


                                                             Operating Systems
                                                             ExtremeXOS is an open, extensible network operating system with a
             10                                              modular design for high availability and application versatility.
Huawei is a leading global information and communications technology (ICT)
solutions provider. Through their dedication to customer-centric innovation
and strong partnerships, they have established end-to-end advantages in
telecom networks, devices and cloud computing. Huawei are committed to
creating maximum value for telecom operators, enterprises and consumers by
providing competitive solutions and services. Huawei products and solutions
have been deployed in over 140 countries, serving more than one third of the
world’s population.




Huawei's vision is to enrich life through communication.

Huawei has filed a total of 31,869 Chinese patents, 8,892 international patents
under the Patent Cooperation Treaty (PCT), and 8,279 overseas patents.


Major Products and Services

Huawei offers a broad range of end-to-end product portfolios, including:




                                                                                  NETWORKING
Routing and Switching
Wireless and Mobility
Network Security
Cloud Computing
Server and storage
Radio Access Networks
Video Surveillance
Unified Communcation and Collaboration
M2M (SCADA)
Applications and Software
Voice over Ip
Energy and Infrastructure




                                                              11
NETWORKING




             Transition Networks, Inc. offers a full suite of fiber networking
              products that enable you to deliver and manage your network traffic
             reliably over fiber optics.


             WHY TRANSITION NETWORKS?

             Transition Networks has created a portfolio of fiber connectivity
             hardware that makes networks perform better, faster, and more
             reliably. Transition Networks offers a complete fiber connectivity
             product portfolio designed to facilitate low-cost network evolution.


             Media Conversion
             Transition Networks brand of media converters make conversion
             between disparate media types possible. The company designs and
             markets these media conversion technologies across a broad
             spectrum of networking protocols including Ethernet, Fast Ethernet,
             ATM, Gigabit Ethernet, T1/E1, DS3, video, Power-over-Ethernet, and
             more. Transition Networks offers its products in chassis, stand alone,
             and PCI form factors.


             Switching
             The MILAN by Transition Networks switch line offers customers            Industrial Grade Conversion
             unique configurations and a high level of service and reliability, all
                                                                                      and Switching
             while serving to ease the stress caused on networks by high-
                                                                                      Transition's industrial networking portfolio
             bandwidth applications.
                                                                                      connects controlled office environments to
                                                                                      extended temperature, factory floor and
             Carrier Grade Fiber Access                                               outdoor industrial environments, including
             Service Providers are constantly striving to meet growing broadband      hazardous locations requiring Class 1 Div 2
             demands and new service offering. Factors such as remote                 certified equipment.
             management, SLAs, establishing QoS, and conserving fiber are
             forcing Carriers to get more out of their network. With Transition's     All Transition products include a lifetime
             complete line of fiber Network Interface Devices (NIDs) including our    warranty, without the fine print.
             MEF 9 and 14 compliant Ethernet products, we're giving Service
             Providers the chance to meet these demands head on and deliver           l Fiber to Copper Media Conversion
             mission critical applications with efficiency and reliability.           l Managed and Unmanaged Switches
                                                                                      l Coarse Wave Division Multiplexing
                                                                                        (CWDM)
                                                                                      l Industrial Networking
                                                                                      l Security and Surveillance
                                                                                      l NICs, SFPs, and GBICs
             12
                                                                                      l Power-over-Ethernet Switches
                                                                                      Converters and Accessories
Qubs, the first romanian networking
                                             Brand, launched in 2002 by Tornado
                                             Sistems, comes with a modern and
                                             functional design and complies with
                                             the new standards at competitive
                                             prices.


                                             Qubs product line covers
                                             the following areas:

                                             l complete LAN solutions for small
                                               and medium sized companies
                                             l home networking, offering
                                               support for application/device
                                               sharing or network games and
                                               plug-and-play facilities
                                             l wireless solutions for business
                                               executives or special users on
                                               the move where wires are not
                                               an option




                                                                                   NETWORKING
Qubs product range
Passive equipment
l Metallic cabinets
l Patch panels
l Copper cables
l Fiber optic cables
l Outlets
l Tools & Devices


Active equipment       Wireless equipment
l NICs                 l Access Point
l Switches             l Ethernet adapters
                                                                 13
l Routers              l Antennas & Cables
l Media converters
NETWORKING




                                                Founded in 1989 and set up in Taiwan, ZyXEL is now the leading provider of
                                                complete broadband access solutions for service providers, as well as business
                                                and home users.

                                                ZyXEL solutions boast the latest, hottest networking features such as Triple Play,
                                                Quality of Service (QoS), Network Security and Network Management. Both
                                                corporate and home users can take advantage of ZyXEL products and services
                                                to enjoy high quality, versatile media applications in a secure and manageable
                                                networking environment.

                                                Today, ZyXEL is one of the few companies in the world capable of offering
                                                complete networking solutions ranging from DSL customer premise equipment,
                                                central office equipment, Internet security appliances, switches, WLAN
                                                equipment, network-attached storage and centralized network management
                                                systems.


                                                To Internet professionals around the world, ZyXEL is a synonymous with for
                                                uncompromising quality and reliability. In fact, if you are enjoying convenient
                                                and versatile online applications, they likely come from a ZyXEL solution.



             With more deliverable information and better empowerment for your communication, ZyXEL products and services
             can bring you, your business partners, friends and families together anytime, anywhere.
             Built with rock-solid stability and security, the ZyXEL solutions are known for their innovative design that makes
             your network more secure and efficient.
             To us, creating more value for partners and customers with ingenious products and services is always the direction
             we are heading.
             With ZyXEL, the possibilities for your network are endless.




             14
Avira, a company with
                                                                          around 100 million
                                                                          customers and 300
                                                                   employees is a worldwide
                                                                     leading supplier of self-
Avira offers a comprehensive security solution that protects              developed security
businesses against viruses, worms, Trojans, rootkits,              solutions for professional
ad/spyware, dialers and other malware. Independent tests          and private use. With more
confirm the constantly high detection performance of the
                                                                 than 25 years of experience,
engine on a regular basis and furthermore, the performance
is independently tested by the TÜV.                                the company is one of the
                                                                        pioneers in this field.
Ten reasons ... why your business is better protected
with Avira.
1. Excellent detection rate based on inhouse virus labs,
where excellent virus researchers develop highly
efficient concepts and methods for malware detection
2. Reliable heuristic guaranteed using technology that
Avira has developed and optimized: the AHeAD
technology, an innovation for the heuristic detection
and defense of potential threats.
3. Low memory consumption using sophisticated
algorithms
4. Maximum security - thanks to the first-class heuristics of
the Avira AntiVir AHeAD technology, the security level does




                                                                                              IT SECURITY
not decrease noticeably even if the end-user does not
update his security solution automatically at hourly intervals
5. Everlasting pioneering spirit because Avira was one of
the first providers worldwide to include security solutions
for Unix in its portfolio and Avira for SAP Net-Weaver.
6. Unique product range with solutions for small, medium-
sized and large-scale and individual solutions for file, proxy
and mail server for Linux and Windows
7. Good price/performance ratio providing bundles
customized for schools, universities and public
institutions.
8. Individual support with real experts at customers’
disposal and no external support service providers
9. Long-term security because Avira is already working on
the protection against possible threats that could appear in
the future
10. Satisfied customers – 70 milions customers                                 15
IT SECURITY




                   Barracuda Networks Inc. is a worldwide leader in content
                   security appliances and offers products that protect
                   organizations from threats over email, Web, and IM.
                   With a strong security heritage, Barracuda Networks offers
                   networking products that improve application delivery
                   and network access with SSL VPN, Internet link load
                   balancing, and server load balancing product lines. Finally,
                   Barracuda Networks offers world-class solutions for
                   backup and data protection that include message
                   archiving, backup software and appliances, and offsite
                   backup services.



                   Powerful Products & Technology

                   Barracuda Networks’ product portfolio includes:

                   l Barracuda Spam & Virus Firewall
                   l Barracuda Web Filter, Barracuda Web Application
                     Firewall
                   l Barracuda SSL VPN, Barracuda Load Balancer
                   l Barracuda Link Balancer
                   l Barracuda Message Archiver
                   l Barracuda Backup Service
                   l BarracudaWare software portfolio.

                   Combining its own award-winning technology with
                   powerful open source software, Barracuda Networks
                   solutions deliver easy to use, comprehensive security,
                   networking, and data protection products. Barracuda
                   Central, an advanced 24x7 operations center manages
                   data centers for all service-based offerings and works to
                   continuously monitor and block the latest Internet
                   threats.




              16
Blockmaster provides mandatory password
protection and automatic hardware encryption of
all stored data products:

SafeStick drives are manageable world-wide on
an enterprise scale with the lightweight
SafeConsole® management software offering full
control, remote life-cycle management and device
enhancement such as remote password recovery,
customised password policy, audit for compliance,
portable authentication tokens, productivity tools.


SafeStick SuperSonic is the ultra-fast speed
edition of the proven SafeStick technology.
SuperSonic shares all the proven security features
of the standard edition and is a technological
breakthrough that takes USB speed to the max.
AES256 hardware encryption has never before
pushed the limits like this. This move is designed
to support the huge growth in rich media files,
such as images and videos, being transferred onto




                                                           IT SECURITY
USB flash drives for business use.

Safeconsole enforces full USB management
control over an organization’s SafeConsoleReady
secure flash drives. With SafeConsole can enable
specific extended features, configure password
policies, remotely reset passwords, activate audit
for compliance and much more.




                                                      17
IT SECURITY




                   Cryptzone

                   Cryptzone is a technology innovator of proactive controls to mitigate IT security risk. It bring together the
                   people, processes and technology to mitigate information security risks identified in the four key areas of
                   Policy Compliance, Content Security, Secure Access and Endpoint Security.


                   Products & Solutions

                   Cryptzone develops and sells world-class technical solutions that help to mitigate IT security risk. This
                   includes NETconsent Policy Compliance, AppGate Access Control, SE46 Application Whitelisting and SEP
                   encryption and secured endpoint protection based on the Cryptzone Management Console.


                   Professional Services

                   Cryptzone Professional Services and support teams work with partners to ensure the success of each IT
                   security project. Tailor-made packages enable customers to implement cutting edge solutions in a
                   manner that suits their business needs and meets demands for regulatory compliance.



                                                               Technical Support and SaaS

                                                               "Follow the sun" support structures enable Cryptzone to provide world-
                                                               class support 24 hours a day, 365 days a year. In addition, Cryptzone offers
                                                               Security-as-a-Service for organizations that choose to adopt effective and
                                                               affordable Cloud Computing services.


                                                               Research and Development

                                                               Cryptzone listens to its customers and keeps abreast of IT security trends in
                                                               order to ensure that its solutions address current IT security issues and the
                                                               road map takes into account likely future requirements. Cryptzone
                                                               develops its solutions using and integrating with leading technology from
                                                               organizations, such as Microsoft®, IBM® and Apple Inc®.




              18
Entrust provides identity-based security solutions that
 empower enterprises, consumers, citizens and Web sites
 in more than 4,000 organizations spanning 60 countries.

 Entrust's identity-based approach offers the right balance
 between affordability, expertise and service. With more
 than 125 patents granted and pending, these world-class
 solutions include strong authentication, fraud detection,
 digital certificates, SSL and PKI.
 Entrust helps organizations meet or exceed their security
 goals by providing software solutions that:
 l protect digital identities through authentication
 l protect information assets through encryption
 l create layered security environments and promote
   efficiency, cost-effectiveness and synergy




Products & technologies
offered by the Entrust:

n Authentication




                                                              IT SECURITY
n Digital certificates & PKI
n Fraud Detection
n Email Security
n Data Protection
n Internet Security
n Developer APIs




                                           19
IT SECURITY




                   IPOQUE is the leading European provider of deep packet inspection (DPI) solutions for Internet traffic
                   management and analysis.

                   PRX Traffic Manager - Next Generation Internet Traffic Management

                   Monitor and control network traffic per application and per subscriber


                   PRX Traffic Manager detects applications with a combination of layer - 7 deep packet inspection (DPI)
                   and behavioral traffic analysis. All major protocols including peer-to-peer file sharing (P2P), instant
                   messaging (IM), media streaming and Internet telephony (VoIP) are supported. The integrated quality of
                   service (QoS) management allows prioritization, shaping and blocking of classified traffic.
                   PACE (Protocol and Application Classification Engine) is the heart of ipoque´s PRX Traffic Manager.
                   Regular signature updates guarantee reliable detection of proprietary, obfuscated and encrypted
                   protocols.


                                                                             Application Scenarios

                                                                             PRX Traffic Manager provides wireline
                                                                             providers, universities and mobile operators
                                                                             comprehensive and detailed insight into the
                                                                             network´s per-application and per-user traffic
                                                                             based on the latest deep packet inspection
                                                                             technology. This information can be used to
                                                                             define bandwidth management rules to
                                                                             prioritize, shape, block and log traffic of
                                                                             individual applications either in total or for
                                                                             individual users or user groups.




                                     IPOQUE technologies:

                                     l Bandwidth management
                                     l Quality of Service
                                     l Copyright protection
              20
LANDesk Software provides systems
management, security management, service
management, asset management, and process
management solutions to organizations.

Thousands of customers worldwide actively use
LANDesk solutions for systems lifecycle
management, endpoint security management,
and IT service management.
LANDesk products are built upon open
Management Automation Platform, and
research firms like Gartner and Forrester
consistently rank LANDesk as an industry leader.


Technologies & Products:
Systems Management Products
l LANDesk Management Suite
l LANDesk Application Virtualization
                                                   Endpoint Security Products




                                                                                              IT SECURITY
l LANDesk Cloud Services Appliance
                                                   l LANDesk Security Suite
l LANDesk Patch Manager
                                                   l LANDesk Patch Manager
                                                   l LANDesk Antivirus
                                                   l Data Protection
                                                   l LANDesk Cloud Services Appliance


                                                   IT Service Management Products
                                                   l LANDesk Service Desk
                                                   l LANDesk Asset Lifecycle Manager
                                                   l LANDesk Management Automation Platform




                                                                                        21
IT SECURITY




                   LogLogic provides enterprise-class log management
                   infrastructure and analysis that turn a customer’s
                   disparate raw log data into business intelligence.
                   Loglogic provides compliance (PCI, HIPAA, FISMA, ISO,
                   ITIL, NERC & SO) and IT data management products


                   Compliance Products

                   IT data is scattered across various locations, is difficult
                   to access, and is hard to make sense of. We can address
                   all of these concerns with our Get.See.Use. architecture,
                   prepacked compliance mappings, alerts and reports;
                   and our unique workflow manager.


                   IT Data Management Products

                   LogLogic IT data management delivers reduced time,
                   cost & hassle of delivering audit quality service, easy
                   and quick resolution of IT and security incidents,
                   visibility and control over key infrastructure, in a
                   package that is simply the most scalable the industry
                   has ever seen.




              22
PixAlert is an Irish technology company who have been protecting corporate reputation and
                                      brand integrity of financial, healthcare, pharma and public sector organisations since 1999
                                      through its innovative and advanced portfolio of critical data and image detection and
                                      protection software solutions.




PixAlert deploy world-class scalable information audit solutions, tailored to suit specific client requirements.
We work closely with our clients to understand their business challenges and provide the optimum
information content security solution. The company currently has a client base of over 200 companies
covering EMEA, AsiaPAC and the US territories.
PixAlert is based in Dublin, Ireland and has sales offices in the UK, US, Australia and New Zealand.




                                                                                                                                    IT SECURITY
                                      Products & technologies:

                                      l Critical Data Auditor
                                      l Image Auditor
                                      l ImageGuard MailAppliance
                                      l DataGuard MailAppliance
                                      l Monitor application

                                      PixAlert saves organisations time and energy while
                                      significantly reducing costs by supplying best practice
                                      customised security solutions which comply with legislation,
                                      enforce corporate policies, enhance the working environment,
                                      improve operational efficiency, protect against civil or criminal
                                      proceedings and brand damage.


                                                                                                                   23
IT SECURITY




               Rapid7 is the leading provider of security
               risk intelligence solutions.

               Rapid7 has broken new ground as an
               industry pioneer within the security
               market for years, providing the industry's
               first solution that truly unifies network
               security, web application security and
               database security into a single framework.

               Rapid7’s security risk intelligence solutions
               include the integrated vulnerability
               management and penetration testing
               products NeXpose® and Metasploit®,
                                                               Products and technologies:
               which empower organizations to obtain
                                                               l Vulnerability Management
               accurate, actionable and contextual
               intelligence into their threat and risk
                                                               Identifying vulnerabilities across networks,
               posture.
                                                               operating systems, databases, Web
                                                               applications and a wide-range of system
                                                               platforms through an integrated, intelligent
                                                               scan engine, Rapid7 NeXpose prioritizes
                                                               vulnerabilities using exploit risk scoring and
                                                               asset criticality ratings

                                                               l Penetration Testing

                                                               Metasploit helps enterprise defenders
                                                               prevent data breaches by efficiently
                                                               prioritizing vulnerabilities, verifying controls
                                                               and mitigation, and conducting broad-
                                                               scope, collaborative, in-depth penetration
                                                               tests.




              24
SonicWALL, a private company headquartered in San Jose,
CA. offers comprehensive network security, secure remote
access, Web and e-mail security, backup and recovery, and
policy and management solutions.
SonicWALL is a recognised global leader in the small and
medium business markets and its solutions are deployed in
distributed enterprise environments, government, retail
point-of-sale and healthcare segments as well as through
service providers.
Technologies & Product lines:

                                                              l SonicWALL Anti-Spam
l SonicWALL® E-Class represents a new generation of
                                                              Desktop delivers client-based
comprehensive solutions for Network Security, Secure
                                                              anti-spam, anti-phishing
Remote Access, Email Security and Policy and Management.
                                                              protection for Outlook,
                                                              Outlook Express or Windows
l SonicWALL Next-Generation Firewalls scan every byte of
                                                              Mail e-mail clients on
every packet for the deepest level of protection and can
                                                              Windows-based desktops or
also be deployed as Unified Threat Management (UTM)
                                                              laptops.
firewalls that offer comprehensive security combining
gateway content filtering, anti-spam, anti-virus, anti-
                                                              l SonicWALL® Continuous
spyware, intrusion prevention, and application intelligence
                                                              Data Protection (CDP) 6.0 with
and control
                                                              support for Windows®, Linux®




                                                                                                 IT SECURITY
                                                              and Mac OS® through a single
l SonicWALL Anti-Virus & Anti-Spyware solutions
                                                              Web GUI is a next-generation
automatically deliver updated security definitions
                                                              data backup and disaster
immediately to the endpoint as soon as they become
                                                              recovery solution that
available, protecting against today’s rapidly-evolving
                                                              automatically preserves and
threats.
                                                              protects business-relevant
                                                              data assets against loss from
                                                              file, device, and location based
                                                              disasters.




                                                                                      25
IT SECURITY




                   WatchGuard builds affordable,     l The WatchGuard SSL families are affordable, easy-to-use,
                   all-in-one network and content      secure remote access solutions providing reliable client
                   security solutions to provide       and clientless connectivity to corporate data and
                   defense in depth for corporate      resources, such as email, file shares and CRM.
                   content, networks and the
                   businesses they power:            l WatchGuard® 3G Extend wireless bridge makes cellular
                                                       connectivity easy and affordable through any
                   l WatchGuard's award-winning        WatchGuard XTM 2 Series or Firebox X Edge e-Series
                     Extensible Threat                 appliance – new or installed. It brings the Internet
                     Management (XTM) network          anywhere you need it, including remote areas and
                     security solutions combine        temporary work sites, without the need for cables
                     firewall, VPN, and security
                     services to protect networks    Since founding in 1996, more than 600,000 WatchGuard
                     from spam, viruses, malware,    signature red security appliances have been deployed
                     and intrusions.                 worldwide.


                   l The new Extensible Content                     Watchguard technologies:
                     Security (XCS) appliances
                     offer content security across                  n FIREWALL
                     email and web combined                         n VPN
                     with data loss prevention for                  n ANTIVIRUS
                     complete content protection.                   n ANTISPAM
                                                                    n WEB CONTENT FILTERING
                                                                    n IPS
                                                                    n CALL SETUP VOIP SECURITY
                                                                    n RED – REPUTATION ENABLED DEFENCE
                                                                    n APPLICATION CONTROL
              26
Webroot is a leading provider of
Internet security for consumers and
businesses worldwide.

Consistently rated among the best
home and enterprise internet
security offerings available,           l Email Archiving Service in the cloud
Webroot’s products include email,
web and archiving internet security     Accelerate e-discovery and meet industry and regulatory
services for businesses, and            compliancerequirements.
antimalware, privacy and identity       Includes: Data Loss Prevention with unlimited data storage in
protection for consumers.               the cloud.


                                        l Endpoint Security Software on the desktop
Products & Services
                                        Quickly remove infections and block new malware.Ideal as an
A multi-layered defense is best
                                        extra layer of protection alongside cloud-based security
protection against today's quickly
evolving threats.




                                                                                                           IT SECURITY
Webroot offer security in the cloud                      l AntiSpyware with AntiVirus Corporate Edition
and on the desktop:
                                                         Reduce cost & simplify management with
l Web Security Service in the cloud                      complete corporate malware protection in a
                                                         single, easy-to-use solution. This means fewer
Stop web-based threats, filter web                       installations and updates, one support team and
traffic, and enforce acceptable use                      better overall system performance.
policy
for corporate and mobile users.

l Email Security Service in the cloud

Protect company data and meet
compliance standards by filtering
emailin the cloud.
                                                                                               27
IT SECURITY




                                                                          While designing and developing the firewall
                                                                          over several years and many releases, the
                                                                          team witnessed the scaling down of firewall
                                                                          technologies.

                                                                          While the perimeter defense is intact, and
                                                                          the market for firewalls has matured, the
                                                                          technology has failed to many critical
                                                                          security issues. It is in this area which
                                                                          Copperfasten has focused its energies,
                                                                          specifically, the need to secure the
                                                                          enterprise not just from the packets
                                                                          themselves but also from the content of
                                                                          these packets.


                                                                          Technology & products

                                                                          Copperfasten develops leading edge
                                                                          Internet Security products for international
                                                                          markets.


                                                                          WebTitan is a complete internet monitoring
                                                                          software (web filter) which provides
                                                                          organisations protection for their data from
                                                                          malware and other internet threats such as
                                                                          viruses, spyware and phishing as well as
                                                                          providing user policy browsing tools to
                                                                          ensure corporate internet policy is adhered
                                                                          to.

                   Copperfasten was founded in January 2000 by the
                                                                          WebTitan is available in two versions,
                   original design team of the highly successful Alta
                                                                          WebTitan ISO and WebTitan for VMware®,
                   Vista Firewall at Digital Equipment Corporation.
                                                                          both of which can be downloaded and
                   Following the acquisition by Compaq and
                                                                          installed for free.
                   subsequent sale of the Alta Vista firewall to Raptor
                   and then Symantec, the Galway based
                                                                          SpamTitan is a complete software solution
                   development team decided that it would pursue
                                                                          to email security offering protection from
                   its own interests and formed Copperfasten
                                                                          Spam, Viruses, Trojans, Phishing and
                   Technologies.
                                                                          unwanted content.
                                                                          SpamTitan is available in three flavours,
                                                                          SpamTitan ISO, SpamTitan for VMware® and
                                                                          SpamTitan On Demand, all of which can be
                                                                          set up and configured for free.
              28
GY
                                                      N OLO
                                                  TECH
                                               DO
                             WITH      RNA
                        IP          TO
                      SH
                    ER
                  TN
                AR
              EP
            TH
         OF
      TS
    FI




                 l ACCESS TO DEMO KITS
  NE
BE




                   (EQUIPMENTS AND
                   APPLICATIONS) FOR
                   DEMONSTRATION PURPOSES
                 l TECHNICAL SUPPORT
                 l PRE-SALES SUPPORT
                 l SPECIAL PRICING ALLOWANCE
                   FOR REGISTERED PARTNERS




          l JOINT MARKETING ACTIVITIES FOR PARTNER EVENTS
          l MARKETING BACK END REBATE AND COLLATERALS
          l CERTIFICATION COURSES IN TECHNOLOGY CENTER
          l SALES LEAD GENERATION
          l NEWSLETTERS AND WEBCAST INVITATIONS




                                                                      PARTNERSHIP
                         l SALES TOOLS,
                           PRESENTATIONS AND
                           INCENTIVES
                         l COMMERCIAL SUPPORT
                           ON PROJECTS
                         l ACCOUNT PROTECTION
                         l SUPPORT MATERIAL




                                                                 29
B2B PLATFORM




               30   B2B
                    Simple and efficient with eServices of the eTornado platform
                    Tornado Technology provides high quality services for partners, intend to
                    ease and improve the daily business activities and to keep our promise to
                    improve the success of partners’ business.
eOrders
Secure access to the detailed information in
real time:
l Product information
lPersonalized list price
lStock availability;
                                                currency;
lOn-line orders on a secure platform for
                                               lAutomatic information on the e-mail of
 direct delivery or for reservation;
                                                the credit balance and the credit limit.
lAutomatic confirmation on e-mail of the
 orders;
lTracking of the on-line orders;
                                               eReport
                                               lCustomized report of the partner business
lEasy management of more orders opened
                                                with Tornado : on product, on brands,
 simultaneously (multibasket).
                                               lTracking of the products shipped either in
                                                custody or invoiced;
eMarketing
lOn-line exclusive promotions;
                                               eNotification
lEasy access to the products in promotions,    lSending on-line the notifications via e-
 selling of the stock or products which had     mail to a listed e-mail address ;
 their price gone down;                        lThe option to select a destination
lRecommandations of alternative products        addresses of the notification different
 available in stock, products in promotions;    from that of the parcels shipped.
lMultiple communications by e-mail.
                                               eInvoice
eRMA                                           lAutomatic sending copies of the invoice
lTracking of the service events;                via e-mail;
lInformation of serial number of the           lThe option to selct a destination addresses




                                                                                              B2B PLATFORM
 products;                                      of the invoice different from that of the
lDetails of the purchased products;             products of the notification;
lOn-line placing of service events on the      lThe option to print the invoice copy
                                                directly from the platform.
 platform

                                               eDeliveries
eAlert                                         lSelection of delivery addresses for
lAlert setting on price or stock;                different products, invoices and transport
lAutomatic confirmation via e-mail for           notice;
 stock availability of selected products;      lSelection directly from the platform of the
eFinancial                                       forwarder and the automatic calculation
lAccess to the financial data: payment           of the transport costs;
 terms, credit limit, current credit;          lTracking the parcels
lAccess to the balance of payments and         (track&trace).



                                                                                     31
Tornado Technology

Weitere ähnliche Inhalte

Was ist angesagt?

Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Distributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLADistributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLAAngelo Corsaro
 
Brochure istituzionale 01 09-inglese
Brochure istituzionale 01 09-ingleseBrochure istituzionale 01 09-inglese
Brochure istituzionale 01 09-ingleseGpsLazio
 
TREND: an industry perspective
TREND: an industry perspectiveTREND: an industry perspective
TREND: an industry perspectiveXiaolin Lu
 
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Paweł Kowalski
 
The Present and Future of DDS
The Present and Future of DDSThe Present and Future of DDS
The Present and Future of DDSAngelo Corsaro
 
Why SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified CommunicationsWhy SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified CommunicationsXO Communications
 
Corporate Presentation (english)
Corporate Presentation (english)Corporate Presentation (english)
Corporate Presentation (english)Mildmac
 
SIP IIR telecom conference
SIP IIR telecom conference SIP IIR telecom conference
SIP IIR telecom conference Pete564
 
Cv umar newest
Cv umar newestCv umar newest
Cv umar newestumarright
 
6 Dg Carrier Services Deck.101609
6 Dg Carrier Services Deck.1016096 Dg Carrier Services Deck.101609
6 Dg Carrier Services Deck.101609markmod
 
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting SolutionsACED Security
 
InTechnology Managed Network Services
InTechnology Managed Network ServicesInTechnology Managed Network Services
InTechnology Managed Network Servicesashleyjenkinson
 

Was ist angesagt? (18)

Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Distributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLADistributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLA
 
PréSentation Axir
PréSentation AxirPréSentation Axir
PréSentation Axir
 
Brochure istituzionale 01 09-inglese
Brochure istituzionale 01 09-ingleseBrochure istituzionale 01 09-inglese
Brochure istituzionale 01 09-inglese
 
TREND: an industry perspective
TREND: an industry perspectiveTREND: an industry perspective
TREND: an industry perspective
 
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
 
Simware RTI: Hello World!
Simware RTI: Hello World!Simware RTI: Hello World!
Simware RTI: Hello World!
 
The Present and Future of DDS
The Present and Future of DDSThe Present and Future of DDS
The Present and Future of DDS
 
Simware RTI Empowering hla with dds
Simware RTI Empowering hla with ddsSimware RTI Empowering hla with dds
Simware RTI Empowering hla with dds
 
Why SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified CommunicationsWhy SIP Makes Sense: Enabling the Evolution to Unified Communications
Why SIP Makes Sense: Enabling the Evolution to Unified Communications
 
MobileComm Training Services
MobileComm Training ServicesMobileComm Training Services
MobileComm Training Services
 
Corporate Presentation (english)
Corporate Presentation (english)Corporate Presentation (english)
Corporate Presentation (english)
 
SIP IIR telecom conference
SIP IIR telecom conference SIP IIR telecom conference
SIP IIR telecom conference
 
KNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILEKNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILE
 
Cv umar newest
Cv umar newestCv umar newest
Cv umar newest
 
6 Dg Carrier Services Deck.101609
6 Dg Carrier Services Deck.1016096 Dg Carrier Services Deck.101609
6 Dg Carrier Services Deck.101609
 
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
2013 14 Interactive Guide to Integrated Anti-Counterfeiting Solutions
 
InTechnology Managed Network Services
InTechnology Managed Network ServicesInTechnology Managed Network Services
InTechnology Managed Network Services
 

Andere mochten auch

Blended learning at Trinity College Queensland
Blended learning at Trinity College QueenslandBlended learning at Trinity College Queensland
Blended learning at Trinity College QueenslandLyndelle Gunton
 
Psicología gestalt
Psicología gestaltPsicología gestalt
Psicología gestaltvladimirjhs
 
0725d283e8b2b0413c3044332654b25a
0725d283e8b2b0413c3044332654b25a0725d283e8b2b0413c3044332654b25a
0725d283e8b2b0413c3044332654b25aStjepan Škravanj
 
Now I have these skills, how can I use them: Practitioner research or researc...
Now I have these skills, how can I use them: Practitioner research or researc...Now I have these skills, how can I use them: Practitioner research or researc...
Now I have these skills, how can I use them: Practitioner research or researc...Lyndelle Gunton
 

Andere mochten auch (8)

Komsije
KomsijeKomsije
Komsije
 
Samuel
SamuelSamuel
Samuel
 
Bettakultcha
BettakultchaBettakultcha
Bettakultcha
 
Blended learning at Trinity College Queensland
Blended learning at Trinity College QueenslandBlended learning at Trinity College Queensland
Blended learning at Trinity College Queensland
 
Ramonine slikarije
Ramonine slikarijeRamonine slikarije
Ramonine slikarije
 
Psicología gestalt
Psicología gestaltPsicología gestalt
Psicología gestalt
 
0725d283e8b2b0413c3044332654b25a
0725d283e8b2b0413c3044332654b25a0725d283e8b2b0413c3044332654b25a
0725d283e8b2b0413c3044332654b25a
 
Now I have these skills, how can I use them: Practitioner research or researc...
Now I have these skills, how can I use them: Practitioner research or researc...Now I have these skills, how can I use them: Practitioner research or researc...
Now I have these skills, how can I use them: Practitioner research or researc...
 

Ähnlich wie Tornado Technology

CNP Company overview
CNP Company overviewCNP Company overview
CNP Company overviewbwainscott
 
Infracomm Technology Solutions Company profile 2012
Infracomm Technology Solutions Company profile 2012Infracomm Technology Solutions Company profile 2012
Infracomm Technology Solutions Company profile 2012Clinton Cowley
 
Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ECS UK
 
Ficha Be One Eng1
Ficha Be One Eng1Ficha Be One Eng1
Ficha Be One Eng1esanchezch
 
DVCOM-PROFILE-Ver-110216
DVCOM-PROFILE-Ver-110216DVCOM-PROFILE-Ver-110216
DVCOM-PROFILE-Ver-110216Renjan George
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)djpuccio
 
Daisy Telecoms Company Profile
Daisy Telecoms Company ProfileDaisy Telecoms Company Profile
Daisy Telecoms Company ProfileNatasha Beukes
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nagui Chalache
 
Special engineering services llc (1)
Special engineering services llc (1)Special engineering services llc (1)
Special engineering services llc (1)Khalid Aljashmi
 
Skytron company profile
Skytron company profileSkytron company profile
Skytron company profilePasi Ankit
 
Company profile 2013 l
Company profile 2013 lCompany profile 2013 l
Company profile 2013 litechswiss
 
Software Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueSoftware Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueInfopulse
 
Managed Network Services
Managed Network ServicesManaged Network Services
Managed Network Servicesgregc65x
 
In Technology Managed Network Services
In Technology   Managed Network ServicesIn Technology   Managed Network Services
In Technology Managed Network ServicesRomzan
 
Managed Network Services
Managed Network ServicesManaged Network Services
Managed Network ServicesMark Halpin
 
InTechnology Managed Network Services
InTechnology Managed Network ServicesInTechnology Managed Network Services
InTechnology Managed Network Servicesmerlinjenks
 

Ähnlich wie Tornado Technology (20)

CNP Company overview
CNP Company overviewCNP Company overview
CNP Company overview
 
Infracomm Technology Solutions Company profile 2012
Infracomm Technology Solutions Company profile 2012Infracomm Technology Solutions Company profile 2012
Infracomm Technology Solutions Company profile 2012
 
Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012
 
Internap at a Glance
Internap at a GlanceInternap at a Glance
Internap at a Glance
 
Ficha be one_eng1
Ficha be one_eng1Ficha be one_eng1
Ficha be one_eng1
 
Ficha be one_eng1
Ficha be one_eng1Ficha be one_eng1
Ficha be one_eng1
 
Ficha Be One Eng1
Ficha Be One Eng1Ficha Be One Eng1
Ficha Be One Eng1
 
ICT Brochure 2016
ICT Brochure 2016ICT Brochure 2016
ICT Brochure 2016
 
DVCOM-PROFILE-Ver-110216
DVCOM-PROFILE-Ver-110216DVCOM-PROFILE-Ver-110216
DVCOM-PROFILE-Ver-110216
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)
 
Daisy Telecoms Company Profile
Daisy Telecoms Company ProfileDaisy Telecoms Company Profile
Daisy Telecoms Company Profile
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
Special engineering services llc (1)
Special engineering services llc (1)Special engineering services llc (1)
Special engineering services llc (1)
 
Skytron company profile
Skytron company profileSkytron company profile
Skytron company profile
 
Company profile 2013 l
Company profile 2013 lCompany profile 2013 l
Company profile 2013 l
 
Software Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueSoftware Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business Value
 
Managed Network Services
Managed Network ServicesManaged Network Services
Managed Network Services
 
In Technology Managed Network Services
In Technology   Managed Network ServicesIn Technology   Managed Network Services
In Technology Managed Network Services
 
Managed Network Services
Managed Network ServicesManaged Network Services
Managed Network Services
 
InTechnology Managed Network Services
InTechnology Managed Network ServicesInTechnology Managed Network Services
InTechnology Managed Network Services
 

Tornado Technology

  • 1.
  • 2. TORNADO TECHNOLOGY MISSION TORNADO was set to provide easy access to performance and efficiency for the Romanian market, offering its business partners a strong, long term relationship based on trust. VALUES We build our company guided by cornerstone values in which we believe. Our desire is to bring added value both to our business and relationship between our companies. 2
  • 3. l Professionalism and Performance: We invest in the personal and professional development of our employees, enlarging our ability to motivate, to inspire l Integrity and Consistency: and bring them to a higher We are committed to level of involvement and maintaining a trustworthy responsibility. relationship, direct approach, fairness and honesty in any situation. l Initiative and innovation: WE BELIVE IN: We encourage imagination and initiative in suggesting new l Communication and things, creating and bringing Feedback: We ask questions; novelty to the products, service search for feedback; make and relationship we provide. recommendations because only by communicating we will acknowledge each other’s expectations, share experience TECHNOLOGY CENTER and reach our goals. 3
  • 4. TECHNOLOGY CENTER The TECHNOLOGY CENTER is designed to offer a professional environment to deliver IT networking and security knowledge according to our vendors’ requirements and enable the partners to implement value added solutions to end customers. The certification training courses are offering a competitive edge to our 4 partners over competition, enabling them to secure the projects and to increase their profitability.
  • 5. We provide in our TECHNOLOGY CENTER a wide range of accredited trainings: l Avira - antivirus technologies; l Barracuda - firewall, antispam, load balancing, link balancer, web content filtering l BlockMaster - secure USB solutions l Brand Rex - communication infrastructure cabling solutions l Cryptzone - encryption technologies l Enterasys - switching, routing, wireless and management and security l Entrust - identity access management l Extreme Networks - switching and wireless l Huawei - switching, routing, unified communication, VOIP, servers and storage, security, wimax; l Ipoque - traffic management l LanDesk - systems and security management: capturing inventory, remote control, software distribution, deploying patches, and working with Operating System Deployment and Provisioning TECHNOLOGY CENTER l LogLogic - log management and business continuity l PixAlert - data protection and illicit image detection l Rapid7 - vulnerability management and penetration testing l SonicWall - firewall, antispam, load balancing, web content filtering and data back-up l Transition Networks - industrial switching and media conversion technologies l WatchGuard - Unified Threat Management (XTM) technologies: firewall, antivirus, antispam, IPS, load balancing, web content filtering, application control, VOIP security, Reputation Enabled Defense; - content security (XCS) technologies: antivirus, antispam, IPS, web content filtering, application control, Data Loss Prevention, l Zyxel - switching and routing, wireless, security, VOIP, fiber access, wimax, media servers, 5 network management
  • 6. PORTOFOLIO Tornado Technology delivers a wide range of products and technologies that recommends us a strategic provider for networking and IT Security solutions. Networking Brand-Rex is a British supplier of structured cabling systems for offices and datacenters: copper and fiber optic cables, patchpanels, high density cabinets, patch cords and wall outlets seen. Enterasys Networks, a Siemens Enterprise Communications Company, is a premier global provider of wired (switching & routing) and wireless (access points & controllers) network infrastructure and security management solutions (Security Information & Event Manager - SIEM). Extreme Networks offers Core and Aggregation switching, Wireless, Mobile Backhaul products, Port Extenders, Security & Management Tools. Huawei is a strategic supplier of mobile telecommunications infrastructure with three core business segments: Telecom Networks, building telecommunications networks; Global Services, offering global equipment, operational services, and consulting services for enterprise customers; and Devices, manufacturing electronic communications devices. Huawei delivers for Enterprise business network infrastructure, fixed and wireless communication, data center and cloud computing. Qubs is the first romanian networking Brand, launched in 2002 by Tornado. Qubs product portfolio includes copper cables and patch cords, wall outlets and connectors, metallic cabinets (Racks) & copper Patch Panels. Transition Networks delivers a wide range of Media Conversion, Switching, Connectivity, Aggregation switches for enterprise and industrial applications. ZyXEL offers complete networking solutions ranging from DSL customer premise equipment, central office equipment, Internet security appliances, switches, WLAN equipment; network attached storage (NAS) and centralized network management systems. IT Security Avira , offers antivirus professional solutions for workstations, file, mail and web servers for Windows/Linux/Unix operating systems. 6
  • 7. Barracuda offers products that protect organizations from threats over email, Web, and InstantMesseging and loadbalancing/link balancing solutions. Coperfasten (WebTitan/SpamTitan) offers comprehensive protection from email and web based threats, including , viruses, Trojans, phishing, malware and other unwanted content Cryptzone offers Policy Compliance, Content Security, Secure Access and Endpoint Security products Entrust solutions include strong authentication, fraud detection, digital certificates, SSL and PKI. Ipoque, provides deep packet inspection (DPI), bandwidth management, copyright protection, QoS solutions for Internet traffic management and analysis. LANDesk provides systems management, security management, service management, asset management, and process management solutions to organizations. Loglogic provides compliance (PCI, HIPAA, FISMA, ISO, ITIL, NERC & SO) and IT data management products PORTOFOLIO Pixalert has innovative and advanced portfolio of critical data and image detection and protection software solutions. Rapid7 is the leading provider of Unified Vulnerability Management and Penetration Testing Solutions. SonicWALL providing services for network firewalls, UTMs (Unified Threat Management), VPNs (Virtual Private Network), backup and recovery, and anti-spam for email. Watchguard offers antivirus, antispam, IPS, firewall, VPN, application control, VoIP security, Reputation Enabled Defence, Data Loss Prevention device solutions Webroot offer SaaS products (web/email security service, email archiving) and endpoint security software Block master offers secure USB flash drivers, encryption data USB AND central USB management products 7
  • 8. NETWORKING Brand Rex is Europe’s leading supplier of communication infrastructure cabling solutions, a niche provider of extreme environment speciality cabling solutions, that design, develop, manufacture and support copper & fibre cable and connectivity systems. Copper Cabling Systems Cat 5e, Cat 6, Cat 6A, Cat 7 and Cat7A advanced end-to-end cabling systems Fibre Cabling Systems Solutions for conventional cabling, centralised fibre installations and telecom / local networks; full range of premise distribution and loose tube fibre optic cables; complete system includes fibre connectivity, adaptors, patch cords and panels; Unique Air Blown Fibre System allowing networks to be easily and cost-effectively upgraded. Data Centre Solutions High Density Copper and Fibre Cabling Solutions Unique Data Centre Solutions designed with an emphasis on: l minimising installation times l maximising precious usable data centre space l minimising footprint Intelligent Infrastructure SmartPatch Intelligent Infrastructure Management System Maximises network service availability and efficiency 8 Enhances network security through identification and isolation of unauthorised users
  • 9. Reliable, Innovative and Customer-Focused Enterasys Networks, a Siemens Enterprise Communications Company, is a premier global provider of wired and wireless network infrastructure and security solutions. Our solutions enable organizations to drive down IT costs while improving business productivity and efficiency through a unique combination of automation, visibility and control capabilities. Enterasys provides a broad range of enterprise networking and security solutions by technology and Enterasys has a rich history as a pioneer in the switching and industry. routing market, dating back to 1998. Today's full portfolio of wired/wireless network infrastructure and security solutions leverages that experience and a robust technology patent portfolio to provide built-in automation, visibility and control capabilities to solve critical customer networking and mobility challenges. The company designs and manufactures all types of NETWORKING networking equipment including routers, switches, and 802.11 wireless access points and controllers. In addition to hardware, the company also builds software for managing and securing enterprise-class networks such as Intrusion Prevention System, Network Access Control and Security Information & Event Management (SIEM). Product categories switching and routing chassis stackable standalone accessories wireless access points controllers management security network management 9 advanced security applications
  • 10. NETWORKING Extreme Networks is a leader in providing enterprise and metro service solutions for open converged networks. Extreme Networks vision of a converged network is one where voice, video, data, and diverse applications and services come together in the same network. Extreme Networks are proud to be among one of the first companies to: l Introduce Gigabit Ethernet products that were tested at full wire-speed with zero packet loss l Offer patented quality of service (QoS) capability on IP/Ethernet networks l Deliver carrier-class Ethernet for metro area networks l Deliver a unified solution that Switching Products allows wired and wireless Core and aggregation switching solutions scale to solve tough voice devices, applications and and security challenges with high availability, crystal clarity, and equipment to share the same integrated security features. Edge switching solutions provide a infrastructure and management powerful portfolio to support everything from basic connectivity to tools advanced, high-speed services for demanding desktop applications. l Deliver a truly modular switching operating system for Mobile Backhaul Products enterprises and metro service Extreme Networks E4G family enables mobile operators to deploy a providers true 4G mobile backhaul network to address the current requirements l Introduce a voice-class modular of 2G and 3G services while laying the foundation for a true 4G mobile switch for the network edge broadband network through three key capabilities --- synchronization, resiliency and performance. Wireless Products Scalable wireless LAN solutions are available for small to medium to large enterprises. Extreme Networks wireless solutions offers world class capabilities including comprehensive network-wide security, enterprise grade voice services and unified policies and services across wired and wireless networks. We enable the enterprise customer to reduce the complexity for wireless network deployment and management. Operating Systems ExtremeXOS is an open, extensible network operating system with a 10 modular design for high availability and application versatility.
  • 11. Huawei is a leading global information and communications technology (ICT) solutions provider. Through their dedication to customer-centric innovation and strong partnerships, they have established end-to-end advantages in telecom networks, devices and cloud computing. Huawei are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Huawei products and solutions have been deployed in over 140 countries, serving more than one third of the world’s population. Huawei's vision is to enrich life through communication. Huawei has filed a total of 31,869 Chinese patents, 8,892 international patents under the Patent Cooperation Treaty (PCT), and 8,279 overseas patents. Major Products and Services Huawei offers a broad range of end-to-end product portfolios, including: NETWORKING Routing and Switching Wireless and Mobility Network Security Cloud Computing Server and storage Radio Access Networks Video Surveillance Unified Communcation and Collaboration M2M (SCADA) Applications and Software Voice over Ip Energy and Infrastructure 11
  • 12. NETWORKING Transition Networks, Inc. offers a full suite of fiber networking products that enable you to deliver and manage your network traffic reliably over fiber optics. WHY TRANSITION NETWORKS? Transition Networks has created a portfolio of fiber connectivity hardware that makes networks perform better, faster, and more reliably. Transition Networks offers a complete fiber connectivity product portfolio designed to facilitate low-cost network evolution. Media Conversion Transition Networks brand of media converters make conversion between disparate media types possible. The company designs and markets these media conversion technologies across a broad spectrum of networking protocols including Ethernet, Fast Ethernet, ATM, Gigabit Ethernet, T1/E1, DS3, video, Power-over-Ethernet, and more. Transition Networks offers its products in chassis, stand alone, and PCI form factors. Switching The MILAN by Transition Networks switch line offers customers Industrial Grade Conversion unique configurations and a high level of service and reliability, all and Switching while serving to ease the stress caused on networks by high- Transition's industrial networking portfolio bandwidth applications. connects controlled office environments to extended temperature, factory floor and Carrier Grade Fiber Access outdoor industrial environments, including Service Providers are constantly striving to meet growing broadband hazardous locations requiring Class 1 Div 2 demands and new service offering. Factors such as remote certified equipment. management, SLAs, establishing QoS, and conserving fiber are forcing Carriers to get more out of their network. With Transition's All Transition products include a lifetime complete line of fiber Network Interface Devices (NIDs) including our warranty, without the fine print. MEF 9 and 14 compliant Ethernet products, we're giving Service Providers the chance to meet these demands head on and deliver l Fiber to Copper Media Conversion mission critical applications with efficiency and reliability. l Managed and Unmanaged Switches l Coarse Wave Division Multiplexing (CWDM) l Industrial Networking l Security and Surveillance l NICs, SFPs, and GBICs 12 l Power-over-Ethernet Switches Converters and Accessories
  • 13. Qubs, the first romanian networking Brand, launched in 2002 by Tornado Sistems, comes with a modern and functional design and complies with the new standards at competitive prices. Qubs product line covers the following areas: l complete LAN solutions for small and medium sized companies l home networking, offering support for application/device sharing or network games and plug-and-play facilities l wireless solutions for business executives or special users on the move where wires are not an option NETWORKING Qubs product range Passive equipment l Metallic cabinets l Patch panels l Copper cables l Fiber optic cables l Outlets l Tools & Devices Active equipment Wireless equipment l NICs l Access Point l Switches l Ethernet adapters 13 l Routers l Antennas & Cables l Media converters
  • 14. NETWORKING Founded in 1989 and set up in Taiwan, ZyXEL is now the leading provider of complete broadband access solutions for service providers, as well as business and home users. ZyXEL solutions boast the latest, hottest networking features such as Triple Play, Quality of Service (QoS), Network Security and Network Management. Both corporate and home users can take advantage of ZyXEL products and services to enjoy high quality, versatile media applications in a secure and manageable networking environment. Today, ZyXEL is one of the few companies in the world capable of offering complete networking solutions ranging from DSL customer premise equipment, central office equipment, Internet security appliances, switches, WLAN equipment, network-attached storage and centralized network management systems. To Internet professionals around the world, ZyXEL is a synonymous with for uncompromising quality and reliability. In fact, if you are enjoying convenient and versatile online applications, they likely come from a ZyXEL solution. With more deliverable information and better empowerment for your communication, ZyXEL products and services can bring you, your business partners, friends and families together anytime, anywhere. Built with rock-solid stability and security, the ZyXEL solutions are known for their innovative design that makes your network more secure and efficient. To us, creating more value for partners and customers with ingenious products and services is always the direction we are heading. With ZyXEL, the possibilities for your network are endless. 14
  • 15. Avira, a company with around 100 million customers and 300 employees is a worldwide leading supplier of self- Avira offers a comprehensive security solution that protects developed security businesses against viruses, worms, Trojans, rootkits, solutions for professional ad/spyware, dialers and other malware. Independent tests and private use. With more confirm the constantly high detection performance of the than 25 years of experience, engine on a regular basis and furthermore, the performance is independently tested by the TÜV. the company is one of the pioneers in this field. Ten reasons ... why your business is better protected with Avira. 1. Excellent detection rate based on inhouse virus labs, where excellent virus researchers develop highly efficient concepts and methods for malware detection 2. Reliable heuristic guaranteed using technology that Avira has developed and optimized: the AHeAD technology, an innovation for the heuristic detection and defense of potential threats. 3. Low memory consumption using sophisticated algorithms 4. Maximum security - thanks to the first-class heuristics of the Avira AntiVir AHeAD technology, the security level does IT SECURITY not decrease noticeably even if the end-user does not update his security solution automatically at hourly intervals 5. Everlasting pioneering spirit because Avira was one of the first providers worldwide to include security solutions for Unix in its portfolio and Avira for SAP Net-Weaver. 6. Unique product range with solutions for small, medium- sized and large-scale and individual solutions for file, proxy and mail server for Linux and Windows 7. Good price/performance ratio providing bundles customized for schools, universities and public institutions. 8. Individual support with real experts at customers’ disposal and no external support service providers 9. Long-term security because Avira is already working on the protection against possible threats that could appear in the future 10. Satisfied customers – 70 milions customers 15
  • 16. IT SECURITY Barracuda Networks Inc. is a worldwide leader in content security appliances and offers products that protect organizations from threats over email, Web, and IM. With a strong security heritage, Barracuda Networks offers networking products that improve application delivery and network access with SSL VPN, Internet link load balancing, and server load balancing product lines. Finally, Barracuda Networks offers world-class solutions for backup and data protection that include message archiving, backup software and appliances, and offsite backup services. Powerful Products & Technology Barracuda Networks’ product portfolio includes: l Barracuda Spam & Virus Firewall l Barracuda Web Filter, Barracuda Web Application Firewall l Barracuda SSL VPN, Barracuda Load Balancer l Barracuda Link Balancer l Barracuda Message Archiver l Barracuda Backup Service l BarracudaWare software portfolio. Combining its own award-winning technology with powerful open source software, Barracuda Networks solutions deliver easy to use, comprehensive security, networking, and data protection products. Barracuda Central, an advanced 24x7 operations center manages data centers for all service-based offerings and works to continuously monitor and block the latest Internet threats. 16
  • 17. Blockmaster provides mandatory password protection and automatic hardware encryption of all stored data products: SafeStick drives are manageable world-wide on an enterprise scale with the lightweight SafeConsole® management software offering full control, remote life-cycle management and device enhancement such as remote password recovery, customised password policy, audit for compliance, portable authentication tokens, productivity tools. SafeStick SuperSonic is the ultra-fast speed edition of the proven SafeStick technology. SuperSonic shares all the proven security features of the standard edition and is a technological breakthrough that takes USB speed to the max. AES256 hardware encryption has never before pushed the limits like this. This move is designed to support the huge growth in rich media files, such as images and videos, being transferred onto IT SECURITY USB flash drives for business use. Safeconsole enforces full USB management control over an organization’s SafeConsoleReady secure flash drives. With SafeConsole can enable specific extended features, configure password policies, remotely reset passwords, activate audit for compliance and much more. 17
  • 18. IT SECURITY Cryptzone Cryptzone is a technology innovator of proactive controls to mitigate IT security risk. It bring together the people, processes and technology to mitigate information security risks identified in the four key areas of Policy Compliance, Content Security, Secure Access and Endpoint Security. Products & Solutions Cryptzone develops and sells world-class technical solutions that help to mitigate IT security risk. This includes NETconsent Policy Compliance, AppGate Access Control, SE46 Application Whitelisting and SEP encryption and secured endpoint protection based on the Cryptzone Management Console. Professional Services Cryptzone Professional Services and support teams work with partners to ensure the success of each IT security project. Tailor-made packages enable customers to implement cutting edge solutions in a manner that suits their business needs and meets demands for regulatory compliance. Technical Support and SaaS "Follow the sun" support structures enable Cryptzone to provide world- class support 24 hours a day, 365 days a year. In addition, Cryptzone offers Security-as-a-Service for organizations that choose to adopt effective and affordable Cloud Computing services. Research and Development Cryptzone listens to its customers and keeps abreast of IT security trends in order to ensure that its solutions address current IT security issues and the road map takes into account likely future requirements. Cryptzone develops its solutions using and integrating with leading technology from organizations, such as Microsoft®, IBM® and Apple Inc®. 18
  • 19. Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and Web sites in more than 4,000 organizations spanning 60 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. With more than 125 patents granted and pending, these world-class solutions include strong authentication, fraud detection, digital certificates, SSL and PKI. Entrust helps organizations meet or exceed their security goals by providing software solutions that: l protect digital identities through authentication l protect information assets through encryption l create layered security environments and promote efficiency, cost-effectiveness and synergy Products & technologies offered by the Entrust: n Authentication IT SECURITY n Digital certificates & PKI n Fraud Detection n Email Security n Data Protection n Internet Security n Developer APIs 19
  • 20. IT SECURITY IPOQUE is the leading European provider of deep packet inspection (DPI) solutions for Internet traffic management and analysis. PRX Traffic Manager - Next Generation Internet Traffic Management Monitor and control network traffic per application and per subscriber PRX Traffic Manager detects applications with a combination of layer - 7 deep packet inspection (DPI) and behavioral traffic analysis. All major protocols including peer-to-peer file sharing (P2P), instant messaging (IM), media streaming and Internet telephony (VoIP) are supported. The integrated quality of service (QoS) management allows prioritization, shaping and blocking of classified traffic. PACE (Protocol and Application Classification Engine) is the heart of ipoque´s PRX Traffic Manager. Regular signature updates guarantee reliable detection of proprietary, obfuscated and encrypted protocols. Application Scenarios PRX Traffic Manager provides wireline providers, universities and mobile operators comprehensive and detailed insight into the network´s per-application and per-user traffic based on the latest deep packet inspection technology. This information can be used to define bandwidth management rules to prioritize, shape, block and log traffic of individual applications either in total or for individual users or user groups. IPOQUE technologies: l Bandwidth management l Quality of Service l Copyright protection 20
  • 21. LANDesk Software provides systems management, security management, service management, asset management, and process management solutions to organizations. Thousands of customers worldwide actively use LANDesk solutions for systems lifecycle management, endpoint security management, and IT service management. LANDesk products are built upon open Management Automation Platform, and research firms like Gartner and Forrester consistently rank LANDesk as an industry leader. Technologies & Products: Systems Management Products l LANDesk Management Suite l LANDesk Application Virtualization Endpoint Security Products IT SECURITY l LANDesk Cloud Services Appliance l LANDesk Security Suite l LANDesk Patch Manager l LANDesk Patch Manager l LANDesk Antivirus l Data Protection l LANDesk Cloud Services Appliance IT Service Management Products l LANDesk Service Desk l LANDesk Asset Lifecycle Manager l LANDesk Management Automation Platform 21
  • 22. IT SECURITY LogLogic provides enterprise-class log management infrastructure and analysis that turn a customer’s disparate raw log data into business intelligence. Loglogic provides compliance (PCI, HIPAA, FISMA, ISO, ITIL, NERC & SO) and IT data management products Compliance Products IT data is scattered across various locations, is difficult to access, and is hard to make sense of. We can address all of these concerns with our Get.See.Use. architecture, prepacked compliance mappings, alerts and reports; and our unique workflow manager. IT Data Management Products LogLogic IT data management delivers reduced time, cost & hassle of delivering audit quality service, easy and quick resolution of IT and security incidents, visibility and control over key infrastructure, in a package that is simply the most scalable the industry has ever seen. 22
  • 23. PixAlert is an Irish technology company who have been protecting corporate reputation and brand integrity of financial, healthcare, pharma and public sector organisations since 1999 through its innovative and advanced portfolio of critical data and image detection and protection software solutions. PixAlert deploy world-class scalable information audit solutions, tailored to suit specific client requirements. We work closely with our clients to understand their business challenges and provide the optimum information content security solution. The company currently has a client base of over 200 companies covering EMEA, AsiaPAC and the US territories. PixAlert is based in Dublin, Ireland and has sales offices in the UK, US, Australia and New Zealand. IT SECURITY Products & technologies: l Critical Data Auditor l Image Auditor l ImageGuard MailAppliance l DataGuard MailAppliance l Monitor application PixAlert saves organisations time and energy while significantly reducing costs by supplying best practice customised security solutions which comply with legislation, enforce corporate policies, enhance the working environment, improve operational efficiency, protect against civil or criminal proceedings and brand damage. 23
  • 24. IT SECURITY Rapid7 is the leading provider of security risk intelligence solutions. Rapid7 has broken new ground as an industry pioneer within the security market for years, providing the industry's first solution that truly unifies network security, web application security and database security into a single framework. Rapid7’s security risk intelligence solutions include the integrated vulnerability management and penetration testing products NeXpose® and Metasploit®, Products and technologies: which empower organizations to obtain l Vulnerability Management accurate, actionable and contextual intelligence into their threat and risk Identifying vulnerabilities across networks, posture. operating systems, databases, Web applications and a wide-range of system platforms through an integrated, intelligent scan engine, Rapid7 NeXpose prioritizes vulnerabilities using exploit risk scoring and asset criticality ratings l Penetration Testing Metasploit helps enterprise defenders prevent data breaches by efficiently prioritizing vulnerabilities, verifying controls and mitigation, and conducting broad- scope, collaborative, in-depth penetration tests. 24
  • 25. SonicWALL, a private company headquartered in San Jose, CA. offers comprehensive network security, secure remote access, Web and e-mail security, backup and recovery, and policy and management solutions. SonicWALL is a recognised global leader in the small and medium business markets and its solutions are deployed in distributed enterprise environments, government, retail point-of-sale and healthcare segments as well as through service providers. Technologies & Product lines: l SonicWALL Anti-Spam l SonicWALL® E-Class represents a new generation of Desktop delivers client-based comprehensive solutions for Network Security, Secure anti-spam, anti-phishing Remote Access, Email Security and Policy and Management. protection for Outlook, Outlook Express or Windows l SonicWALL Next-Generation Firewalls scan every byte of Mail e-mail clients on every packet for the deepest level of protection and can Windows-based desktops or also be deployed as Unified Threat Management (UTM) laptops. firewalls that offer comprehensive security combining gateway content filtering, anti-spam, anti-virus, anti- l SonicWALL® Continuous spyware, intrusion prevention, and application intelligence Data Protection (CDP) 6.0 with and control support for Windows®, Linux® IT SECURITY and Mac OS® through a single l SonicWALL Anti-Virus & Anti-Spyware solutions Web GUI is a next-generation automatically deliver updated security definitions data backup and disaster immediately to the endpoint as soon as they become recovery solution that available, protecting against today’s rapidly-evolving automatically preserves and threats. protects business-relevant data assets against loss from file, device, and location based disasters. 25
  • 26. IT SECURITY WatchGuard builds affordable, l The WatchGuard SSL families are affordable, easy-to-use, all-in-one network and content secure remote access solutions providing reliable client security solutions to provide and clientless connectivity to corporate data and defense in depth for corporate resources, such as email, file shares and CRM. content, networks and the businesses they power: l WatchGuard® 3G Extend wireless bridge makes cellular connectivity easy and affordable through any l WatchGuard's award-winning WatchGuard XTM 2 Series or Firebox X Edge e-Series Extensible Threat appliance – new or installed. It brings the Internet Management (XTM) network anywhere you need it, including remote areas and security solutions combine temporary work sites, without the need for cables firewall, VPN, and security services to protect networks Since founding in 1996, more than 600,000 WatchGuard from spam, viruses, malware, signature red security appliances have been deployed and intrusions. worldwide. l The new Extensible Content Watchguard technologies: Security (XCS) appliances offer content security across n FIREWALL email and web combined n VPN with data loss prevention for n ANTIVIRUS complete content protection. n ANTISPAM n WEB CONTENT FILTERING n IPS n CALL SETUP VOIP SECURITY n RED – REPUTATION ENABLED DEFENCE n APPLICATION CONTROL 26
  • 27. Webroot is a leading provider of Internet security for consumers and businesses worldwide. Consistently rated among the best home and enterprise internet security offerings available, l Email Archiving Service in the cloud Webroot’s products include email, web and archiving internet security Accelerate e-discovery and meet industry and regulatory services for businesses, and compliancerequirements. antimalware, privacy and identity Includes: Data Loss Prevention with unlimited data storage in protection for consumers. the cloud. l Endpoint Security Software on the desktop Products & Services Quickly remove infections and block new malware.Ideal as an A multi-layered defense is best extra layer of protection alongside cloud-based security protection against today's quickly evolving threats. IT SECURITY Webroot offer security in the cloud l AntiSpyware with AntiVirus Corporate Edition and on the desktop: Reduce cost & simplify management with l Web Security Service in the cloud complete corporate malware protection in a single, easy-to-use solution. This means fewer Stop web-based threats, filter web installations and updates, one support team and traffic, and enforce acceptable use better overall system performance. policy for corporate and mobile users. l Email Security Service in the cloud Protect company data and meet compliance standards by filtering emailin the cloud. 27
  • 28. IT SECURITY While designing and developing the firewall over several years and many releases, the team witnessed the scaling down of firewall technologies. While the perimeter defense is intact, and the market for firewalls has matured, the technology has failed to many critical security issues. It is in this area which Copperfasten has focused its energies, specifically, the need to secure the enterprise not just from the packets themselves but also from the content of these packets. Technology & products Copperfasten develops leading edge Internet Security products for international markets. WebTitan is a complete internet monitoring software (web filter) which provides organisations protection for their data from malware and other internet threats such as viruses, spyware and phishing as well as providing user policy browsing tools to ensure corporate internet policy is adhered to. Copperfasten was founded in January 2000 by the WebTitan is available in two versions, original design team of the highly successful Alta WebTitan ISO and WebTitan for VMware®, Vista Firewall at Digital Equipment Corporation. both of which can be downloaded and Following the acquisition by Compaq and installed for free. subsequent sale of the Alta Vista firewall to Raptor and then Symantec, the Galway based SpamTitan is a complete software solution development team decided that it would pursue to email security offering protection from its own interests and formed Copperfasten Spam, Viruses, Trojans, Phishing and Technologies. unwanted content. SpamTitan is available in three flavours, SpamTitan ISO, SpamTitan for VMware® and SpamTitan On Demand, all of which can be set up and configured for free. 28
  • 29. GY N OLO TECH DO WITH RNA IP TO SH ER TN AR EP TH OF TS FI l ACCESS TO DEMO KITS NE BE (EQUIPMENTS AND APPLICATIONS) FOR DEMONSTRATION PURPOSES l TECHNICAL SUPPORT l PRE-SALES SUPPORT l SPECIAL PRICING ALLOWANCE FOR REGISTERED PARTNERS l JOINT MARKETING ACTIVITIES FOR PARTNER EVENTS l MARKETING BACK END REBATE AND COLLATERALS l CERTIFICATION COURSES IN TECHNOLOGY CENTER l SALES LEAD GENERATION l NEWSLETTERS AND WEBCAST INVITATIONS PARTNERSHIP l SALES TOOLS, PRESENTATIONS AND INCENTIVES l COMMERCIAL SUPPORT ON PROJECTS l ACCOUNT PROTECTION l SUPPORT MATERIAL 29
  • 30. B2B PLATFORM 30 B2B Simple and efficient with eServices of the eTornado platform Tornado Technology provides high quality services for partners, intend to ease and improve the daily business activities and to keep our promise to improve the success of partners’ business.
  • 31. eOrders Secure access to the detailed information in real time: l Product information lPersonalized list price lStock availability; currency; lOn-line orders on a secure platform for lAutomatic information on the e-mail of direct delivery or for reservation; the credit balance and the credit limit. lAutomatic confirmation on e-mail of the orders; lTracking of the on-line orders; eReport lCustomized report of the partner business lEasy management of more orders opened with Tornado : on product, on brands, simultaneously (multibasket). lTracking of the products shipped either in custody or invoiced; eMarketing lOn-line exclusive promotions; eNotification lEasy access to the products in promotions, lSending on-line the notifications via e- selling of the stock or products which had mail to a listed e-mail address ; their price gone down; lThe option to select a destination lRecommandations of alternative products addresses of the notification different available in stock, products in promotions; from that of the parcels shipped. lMultiple communications by e-mail. eInvoice eRMA lAutomatic sending copies of the invoice lTracking of the service events; via e-mail; lInformation of serial number of the lThe option to selct a destination addresses B2B PLATFORM products; of the invoice different from that of the lDetails of the purchased products; products of the notification; lOn-line placing of service events on the lThe option to print the invoice copy directly from the platform. platform eDeliveries eAlert lSelection of delivery addresses for lAlert setting on price or stock; different products, invoices and transport lAutomatic confirmation via e-mail for notice; stock availability of selected products; lSelection directly from the platform of the eFinancial forwarder and the automatic calculation lAccess to the financial data: payment of the transport costs; terms, credit limit, current credit; lTracking the parcels lAccess to the balance of payments and (track&trace). 31