COMPLETE CLOUD SOLUTIONS THAT SOLVE CUSTOMERS' NEEDS - Westcon-Comstor

Transcription

COMPLETE CLOUDSOLUTIONS THAT SOLVECUSTOMERS’ NEEDS

Westcon-Comstor’s goal is to make it easy foryou to build a lucrative, thriving cloud business.That’s why we offer a portfolio focused onthe most critical cloud technologies and themost-trusted and fastest-growing vendors. It’salso why we invest so heavily in value-addedservices for our resellers. We operate from asolution-centric approach, carefully vetting andincubating ISVs regionally and globally, allowingyou to offer the most appropriate and completesolutions to your customers, no matter theirbusiness needs or challenges.Following are the Security, UCC and NetworkingCloud partners and solutions available fromWestcon-Comstor.

SECURITYSECURITY VENDORSCloud access security brokers (CASBs) are on-premises or cloud-based securitypolicy enforcement points placed between cloud service consumers and cloudservice providers. CASBs combine and interject enterprise security policies as thecloud-based resources are accessed, and they consolidate multiple types of securitypolicy enforcement. Example security policies include authentication, single signon, authorization, credential mapping, device profiling, encryption, tokenization,logging, alerting and malware detection/prevention.CISCO CLOUDLOCKPALO ALTO NETWORKSAPERTURESYMANTEC CLOUDSOCCloud workload protection platforms (CWPPs) are host-centric solutions thattarget the unique requirements of server workload protection in modern hybriddata center architectures.BLUESKY CLOUD SECURITYPOWERED BY DOME9SYMANTEC CLOUD WORKLOADPROTECTIONDDoS (Distributed Denial of Service) Mitigation is a set of techniques ortools for resisting or mitigating the impact of DDoS attacks on networksattached to the Internet by protecting the target and relay networks.ARBOR NETWORKSDDOS PROTECTIONCHECK POINTTHREATCLOUDF5 SILVERLINE

An endpoint protection platform (EPP) is a solution that convergesCloud security analytics detect attacks as fast as possible, enable ITendpoint device security functionality into a single product that deliversprofessionals to block or stop an attack and provide detailed information toantivirus, anti-spyware, personal firewall, application control and otherreconstruct an attack. They do this by collecting, correlating and analyzing astyles of host intrusion prevention such as behavioral blocking. Morewide range of data.advanced EPP solutions are starting to integrate with vulnerability, patchand configuration management capabilities for more proactive protection.BEYONDTRUST BEYONDSAASBLUESKY CLOUD SECURITYPOWERED BY DOME9Beyond fighting malware, modern EPP products are expanding to includedata protection features, such as disk and file encryption, data lossprevention and device control. The majority of the EPP market is focusedon PC-type endpoints; however, these solutions increasingly are starting toencompass management and tracking of mobile devices, such as tablets andsmartphones.Identity and access management (IAM) is the security discipline thatenables the right individuals to access the right resources, at the righttime, for the right reasons. IAM addresses the mission-critical need toensure appropriate access to resources across increasingly heterogeneoustechnology environments, and to meet increasingly rigorous complianceCHECK POINT SANDBLASTPALO ALTO NETWORKS TRAPSCYLANCE PROTECTSYMANTEC ENDPOINTPROTECTIONA secure email gateway protects the access and content of an emailaccount or service. It allows an individual or organization to secure therequirements. Enterprises that develop mature IAM capabilities canreduce their identity management costs and, more importantly, becomesignificantly more agile in supporting new business initiatives.BEYONDTRUST BEYONDSAASPULSE SECURE CLOUD SECUREBLUESKY CLOUD SECURITYPOWERED BY DOME9SYMANTEC VIPoverall access to one or more email addresses/accounts.CHECK POINTSANDBLAST CLOUDCISCO EMAILSECURITYSYMANTEC EMAILSECURITY CLOUDMobile device management (MDM) encompasses the administrationof mobile devices, such as smartphones, tablets and laptops, to ensureemployees stay productive and do not breach corporate data protectionpolicies. MDM is usually implemented with the use of a third-party productSecure Web gateway solutions protect Web-surfing PCs from infection.and ensures corporate data segregation, and securing emails and corporateThese gateways must, at minimum, include URL filtering, malicious-codedocuments, on mobile devices. By controlling and protecting the data anddetection and filtering, and application controls for popular Web-basedconfiguration settings of all mobile devices on a network, MDM can reduceapplications, such as instant messaging (IM) and Skype. Native or integratedsupport costs and business risks. MDM optimizes the functionality and securitydata leak prevention is also increasingly included.of a mobile communications network while minimizing cost and downtime.CHECK POINT VSECCISCO UMBRELLACISCO IRONPORTSYMANTEC SECURE WEBGATEWAYMDM implementations can be either on-premises or cloud-based.CHECK POINT SANDBLASTMOBILEPULSE SECURE WORKSPACE

UCC & NETWORKINGUCC & NETWORKING VENDORSUnified communications and collaboration (UCC)Hosted wireless and SD-WAN networking solutionsdescribes the combination of communications andprovide the communications backbone that connectcollaboration technologies, including voice and telephony,computers and related devices.messaging and presence, and communications-enabledapplications.CISCO SPARKMICROSOFTHosted Wireless solutions fulfill enterprise wireless LANneeds and are delivered from the cloud or as a managedservice, eliminating the need for maintaining complexwireless infrastructure.CISCO MERAKIMOJO NETWORKSVideo-as-a-Service (VaaS) and Web-conferencing enablevirtual meetings.SD-WAN solutions provide a replacement for traditionalVaaS includes group video systems that primarily servethe need for high-quality video interaction across a rangeof meeting room sizes and endpoint types, including softclients and mobile devices. They also include the requisiteinfrastructure to connect these endpoints for point-topoint and multipoint conference calls. The infrastructureto support video interaction is deployed on-premises andconsumed from cloud providers “as a service.”Web-conferencing products are real-time collaborationtools that support interactions over a network betweenparticipants in multiple meeting formats. Webconferencing meetings and communications includewebinars, remote training, online meetings, and audio andvideo communications.CISCO WEBEXMICROSOFTPOLYCOMWAN routers and are agnostic to WAN transporttechnologies. SD-WAN provides dynamic, policybased, application path selection across multiple WANconnections and supports service chaining for additionalservices, such as WAN optimization and firewalls.VIPTELA

To learn more about Westcon-Comstor, visit our websiteat www.westconcomstor.com 2017 WestconGroup. All rights reserved.

PROTECTION DDoS (Distributed Denial of Service) Mitigation is a set of techniques or tools for resisting or mitigating the impact of DDoS attacks on networks attached to the Internet by protecting the target and relay networks. ARBOR NETWORKS DDOS PROTECTION CHECK POINT THREATCLOUD F5 SILVERLINE. A secure email gateway protects the access and content of an email account or service. It allows .