Archive for May, 2016

Join Net-Ctrl at Infosecurity Europe – 07-9th June – Olympia

Friday, May 27th, 2016

Infosecurity (InfoSec) is Europe’s number one information security event, featuring the largest and most comprehensive education programme, and over 315 exhibitors showcasing the most diverse range of products and services to 12,000 visitors.

The 21st edition of the event will take place at Olympia in London, 7-9 June 2016

Net-Ctrl have a number of key partner exhibiting and are available for meetings throughout. If you would like to book an appointment with a Net-Ctrl representative please email

Our partners exhibiting include:

ForeScout Technologies: Stand G20
ForeScout Technologies Inc. offers organizations the ability to see networked devices, including non-traditional devices, control them, and orchestrate information sharing and operation among disparate security tools.

Fortinet Inc: Stand F125
Fortinet provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric.

Gemalto: Stand D100
Gemalto is the world leader in digital security. Gemalto’s portfolio offers advanced cryptographic software, highly robust and scalable back-office platforms for authentication, encryption and digital credential management.

iboss Network Security: Stand G45
Iboss’ game-changing SWG platform (now including FICO threat scoring) is backed by over 80 patents and chosen by over 4000 enterprises worldwide to increase their security postures.

Juniper Networks: Stand F200
Juniper Networks create the most automated, scalable and secure networks for unprecedented agility, efficiency and value.

Kaspersky Lab: Stand D100
Kaspersky Lab develop, produce and distribute world class anti-malware and anti-virus protection for workstations, laptops, file servers, mail servers, Internet gateway or smartphones, giving the customer complete confidence that the network is secure.

Palo Alto Networks: Stand B180
Palo Alto Networks highly optimised next-generation security platforms deliver visibility and control over applications and users, while simultaneously inspecting all content for all threats all the time.

Pulse Secure: Stand D85
Pulse Secure is a leading provider of access and mobile security solutions. Pulse Secure’s mission is to enable open, integrated enterprise system solutions that empower business productivity through seamless mobility.

When & where?

7th – 9th June 2016
Olympia, London – United Kingdom

Opening times:
Tues 7th June 09.30 – 17.30
Wed 8th June 09.30 – 17.30
Thur 9th June 09.30 – 16.00

Register for your ticket now.

Simplifying Network Management with AMF

Thursday, May 26th, 2016

AMF by Allied Telesis delivers real and immediate value to businesses by solving one of IT’s most pressing needs. It provides a converged infrastructure that can be managed as a single entity, reducing complexity and TCO, and allowing more to be done with less.

Managing network infrastructure is time intensive, costly, and has traditionally required expensive, third-party applications to effectively manage larger networks. Cloud computing and converged infrastructures deliver a great deal of business value to the enterprise, but they also add complexity. In turn, networks must be more fluid and evolve at increasingly greater speeds in order to keep pace with the modern applications and service delivery models that are driving that complexity. For everything from virtualization to mobility and BYOD, networks must be able to keep pace with business. Allied Telesis Management Framework™ (AMF) helps IT do just that by greatly reducing the time and cost of managing network infrastructure.

AMF is an embedded technology native to Allied Telesis switches that delivers real and immediate value to businesses. Many enterprises see SDN as the ‘silver bullet’ to simplifying and optimizing the performance of their environment. While SDN may deliver agility and flexibility – which is particularly relevant for data centers and large enterprise organizations – the management and control of the network itself provides ongoing challenges. The most pressing needs of many organisations demand a single, converged infrastructure that can be managed as a single entity, reducing complexity and TCO and allowing more to be done with less.

AMF achieves this and more by delivering:

  • Unified network management from any device across the network
  • Graphical management of the network with Vista Manager
  • Network automation that simplifies and automates tasks across the network
  • Network intelligence that reacts to changes within the network and automatically changes the topology of the network
  • Automatic backup, restore, and recovery of devices as they are added to the network
  • Through this combination of robust features, AMF drives lower network operating expenses by reducing the complexity and level of effort required to maintain the network. One Allied Telesis customer has reported a 60% reduction in operational costs by deploying AMF.

    Contact our team for more information on the AMF solution by Allied Telesis by completing the form on the right hand side, or by emailing

    How Secure is Your Internet Gateway?

    Thursday, May 26th, 2016

    One of the cheapest and easiest ways for an attacker to get into to your network is through users accessing the Internet. By successfully exploiting an endpoint, an attacker can take hold in your network and begin to move laterally toward an end goal, whether that is to steal your source code, exfiltrate your customer data, or take down your infrastructure. To protect your network from cyberattacks and improve your overall security posture, implement a Best Practice Internet Gateway Security Policy.

    A best practice Internet gateway security policy has two main security goals:

    Minimise the chance of a successful intrusion—Unlike legacy port-based security policies that either block everything in the interest of network security, or enable everything in the interest of your business, a best practice security policy leverages App-ID™, User-ID™, and Content-ID™ to ensure safe enablement of applications across all ports, for all users, all the time, while simultaneously scanning all traffic for both known and unknown threats.

    Identify the presence of an attacker—A best practice Internet gateway security policy provides built-in mechanisms to help you identify gaps in the rulebase and detect alarming activity and potential threats on your network.

    These best practices work because they employ methodologies (shown in the infographic below) that help you reduce your attack surface and enable detection and prevention of both known and unknown threats at all stages of the attack lifecycle.

    Best Practice Internet Gateway Security Policy from PaloAltoNetworks

    Remember, security doesn’t come in a box. When deciding whether to implement a best practice Internet gateway security policy, answer the following questions:

  • Are you using an application-based security policy?
  • Blocking dangerous URLs and file types?
  • Scanning for known and unknown threats? Decrypting traffic?
  • If you answered no to any of these questions, you have room to improve your security posture.

    Fill in the form on the right hand side and one our team will be in touch.

    View the original entry by Charissa Fleischer on the Palo Alto Networks blog.

    Gemalto Wins 2016 Cybersecurity Excellence Award for Best Multi-Factor Authentication Solution

    Thursday, May 26th, 2016

    Gemalto, the world leader in digital security, announces that it has been named a winner in the 2016 Cybersecurity Excellence Awards. Gemalto’s SafeNet Authentication Service was voted best Multi-Factor Authentication Service by the 300,000 member LinkedIn Information Security Community.

    SafeNet Authentication Service is the leading cloud-based multi-factor authentication solution that delivers fully-automated, highly secure user authentication with flexible token options that are tailored to the unique needs of each organization, substantially reducing the total cost of operation. With no infrastructure required, the service enables rapid deployment to protect cloud-based and on-premises applications and data as well as corporate networks, identities and devices. Customers also benefit from the integration of SafeNet Authentication Service with the most widely deployed applications and technologies, enabling IT organizations to employ strong authentication anywhere a password is used to protect their entire IT ecosystem.

    “With over 430 entries, the awards are highly competitive and our winners reflect the very best in product innovation and excellence in the cybersecurity space,”
    said Holger Schulze, founder of the 300,000-member Information Security Community on LinkedIn

    “This recognition by the end user community highlights Gemalto’s market leadership in delivering strong user authentication solutions with the flexibility of being delivered from the cloud or on-premises,” said François Lasnier, Senior Vice President of Identity Protection at Gemalto. “Our innovative, cloud-based solution is deployed by thousands of enterprises, governments and other organizations to secure access to corporate networks, enterprise applications, and cloud-based services for millions of end users.”

    Related Resources
    SafeNet Authentication Service – Overview

    About The Cybersecurity Excellence Awards
    The Cybersecurity Excellence Awards honor companies and individuals that demonstrate excellence, innovation and leadership in information security. This independent awards program is produced in cooperation with the Information Security Community on LinkedIn, tapping into the experience of over 300,000+ cybersecurity professionals to recognize the world’s best cybersecurity products, individuals and organizations. For more information visit

    View the original article released by Gemalto.

    Palo Alto Networks Named a Leader in Automated Malware Analysis Report

    Tuesday, May 24th, 2016

    Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that its WildFire™ offering was recognised by Forrester® Research as a leader among automated malware analysis providers.

    In the report, “The Forrester Wave™: Automated Malware Analysis, Q2 2016,” Forrester analysed technologies from 11 vendors using 36 different criteria. In the firm’s analysis of Palo Alto Networks WildFire cloud-based offering, Forrester noted that Palo Alto Networks “pushes automated malware analysis into the NGFW feature stack.” Forrester described the company’s strategy going forward as “comprehensive, covering prevention as well as detection and response.”

    According to the report, in its discussion of Automated Malware Analysis: “These tools have transformed the specific skill sets of manual practitioners into an automated technology solution that uses static and dynamic analysis methods to detect existing malware while also discovering brand new exploit tools. In 2016, these technologies have shifted from possible to necessary investments in a security stack designed to prevent the known and detect the unknown.” (1)


    “We are honored by Forrester’s recognition of WildFire, which is an integral component of our next-generation security platform and a vital tool for organisations that want to prevent successful cyber breaches by protecting against known and unknown threats.”

    – René Bonvanie, EVP & CMO, Palo Alto Networks

    WildFire offers advanced protection from unknown threats. Through native integration with Palo Alto Networks Next-Generation Security Platform, the service brings advanced threat detection and prevention to every security appliance deployed throughout the network, endpoint and cloud, automatically sharing protections with all subscribers globally in as little as five minutes.

    Over 30,000 customers in 140 countries have chosen Palo Alto Networks because of our deep expertise, unwavering commitment to innovation and breach prevention-oriented next-generation platform.

    To learn more about the Palo Alto Networks WildFire offering, visit:

    To learn more about the Palo Alto Networks Next-Generation Security Platform, visit:

    To access the report, visit:

    1 – The Forrester Wave™: Automated Malware Analysis, Q2 2016, Forrester Research, Inc., April 21, 2016

    Upgrade Your Wireless and Save with Ruckus

    Monday, May 23rd, 2016

    Ruckus Wireless have launched a new discount model aimed at customers that are unhappy with their current wireless system, or looking to upgrade their deployment. This is available for both current Ruckus customers, and those using competitive solutions.

    In either scenario we can get access to additional discount which comes right to you.

    This promotion is valid until 30th September 2016.

    The promotion provides additional discounts on:

    R310 – Dual Band 2×2:2 802.11ac AP
    R500 – Dual Band 2×2:2 802.11ac AP
    R600 – Dual Band 3×3:3 802.11ac AP
    R700 – Dual Band 3×3:3 802.11ac AP
    R710 – Dual Band MU-MIMO 4×4:4 802.11ac IoT Ready AP

    T300 – Dual Band 2×2:2 802.11ac External AP
    T301 – Dual Band 2×2:2 802.11ac External AP

    as well as their SmartZone 100 Controller solution.

    If you’re unsure on which way to upgrade, take a read of our Ruckus upgrade guide, or email

    Any questions, please feel free to ask.

    There a few T&Cs associated to the offer. These include:

    That the reseller discussing must have registered the opportunity with Ruckus before discussing pricing
    The promotion cannot be combined with any others that Ruckus decide to run
    The old equipment being upgraded is decommissioned.

    One of MOBOTIX‘ Imaging Sensor Suppliers Heavily Affected by Earthquake in Japan

    Monday, May 23rd, 2016

    We would like to personally inform you about a force majeure which most probably affects the whole video security industry.

    In April this year a big earthquake in Japan caused significant damages to Sony‘s imaging sensor manufacturing plant in the Kumamoto region. MOBOTIX are in close contact with Sony and based on the most recent information they expect that the manufacturing operations will be restarted by end of May.

    However, there is a possible risk of a future shortage of imaging sensors from Sony which will affect the supply availability of various camera manufacturers.

    MOBOTIX will do everything to mitigate the risk for our customer base:

    Their own stock of 6MP sensors will cover the demand in the near future but they might face a 6MP sensor shortage towards late summer.

    They are preparing to have sufficient quantities of their 5MP camera line – which is still outperforming most cameras on the market – available for you. With their established 5MP cameras they will also be able to cover unplanned and extraordinary customer needs.

    We will keep you updated on the status.

    Cloudpath Secure Onboarding Solution

    Friday, May 20th, 2016


    As some of you will be aware Ruckus Wireless purchased Cloudpath, a leader in secure and scalable onboarding solutions, back in October 2015.

    Cloudpath is vendor agnostic, extremely customisable, it can be run as on-prem or cloud and it’s tied to the device not the user, but a user can have as many devices as needed under that single user license seat.

    Cloudpath will solve a number of challenges that our tech team are asked by our customers including:

  • Admin wants user to experience 100% customisable captive portal pages
  • Wants users on the network securely – DPSK can be too much of a hassle in large user count networks
  • Admins don’t want to setup own RADIUS servers but still want Dynamic VLNA tagging – Not possible with just Ruckus Captive portal only with DPSK (see issue number 2) Cloudpath does allow for D-VLAN tagging.
  • Admins want to push certificates out to user for SSL web decryption automatically – tricky to do in a BYOD deployment without Cloudpath – MDM can do this but users don’t want to enroll own device in MDM solution
  • Admins don’t want jailbroken iOS devices or root Android devise on the network – NAC controller over BYOD etc.
  • We’re currently offering one-on-one webinars to introduce people to the solution. These will be taken by our in-house engineers and will be customised to your workplace.

    If you would like to attend one of our webinars, email

    As mentioned above Cloudpath is vendor agnostic, so even if you don’t have Ruckus, but are interested in the solutions, please do let us know.

    Below is a bit more information about the solution. Any questions, please ask.

    Cloudpath ES provides a simple approach that unlocks the power of certificate-based Wi-Fi for an interruption-free user experience without the need for IT assistance.

    The built-in portal allows users to onboard a wide array of new devices in a self-service, automated manner. With support for issuing certificates via the built-in certificate infrastructure and from existing Public Key Infrastructure (PKI), such as Microsoft CA.

    The rich policy controls in Cloudpath ES ensure that every device is uniquely identifiable, provisioned with the appropriate certificate, and has the appropriate policy applied. Policies can be built using traditional mechanisms, like Active Directory and group mapping, along with powerful new mechanisms, including Google Apps for a seamless Chromebook experience.

    Cloudpath by Ruckus Datasheet
    Cloudpath Case Study – Blackpool and The Fylde College