1 Security. Identity. Mobility.
2 About Us Shifra is a value added distributor founded in 2007 out of Dubai Internet City with a partner network covering the Middle East region. Shifra provides expertise to enterprise customers around the Middle East in three main areas: Information Security, Identity Protection and Enterprise Mobility. The name Shifra originates from the word Sifr, the Arabic numeral zero which was later used to describe a cipher that then created a coded message, thus forming the basis of encryption as we know it today. With an extensive experience in channel development for multi-national vendors the Shifra team has the perfect aptitude to understand the needs of the market and satisfy them. Our team consists of information technology experts that hold a cumulative experience of over 100 years in the field. Shifra professionals bring international experience from across the world; the US, Europe, Asia and the Middle East region.
3 security With the ever increasing amount of data being compromised due to inefficient and backward security solutions, importance of effective data protection became undeniable. Shifra offers a variety of information security and authentication services that helps organizations to protect and manage their logical, physical, and cloud-based data assets. Solutions we provide: Targeted Attack Protection Data leakage prevention Network access control Encryption Network Protection Threat & Incident Response Security Event and Incident Management Vulnerability Management Social Media Brand Protection Incident response platform Multi factor authentication Secure protection against Distributed Denial of Service (DDoS) attacks 1
4 security Data protection with Powerful solution These solutions are designed to work effectively even in today's world of empowered end-users and proliferating data. Proofpoint comprehensive and integrated data loss prevention and protection approach means organizations gain superior protection against today's advanced, targeted threats, secure communication and collaboration, lower total cost of ownership and an extensible security-as-a-service platform. Proofpoint solutions enable organizations to: Gartner positions Proofpoint as the Leader in Leaders Quadrant in its 2014 Magic Quadrant for Secure Gateways. Magic Quadrant for Secure Gateways CHALLENGERS keep malicious content out of their environments; LEADERS prevent the theft or inadvertent loss of sensitive data; Cisco ensure archiving compliance with regulatory data protection mandates; Symantec Microsoft Barracuda Networks collect, securely retain, govern and discover sensitive data for compliance and litigation support; Sophos Mimecast securely communicate and collaborate on sensitive data with customers, partners and suppliers. McAfee Websense ABILITY TO EXECUTE SilverSky Trustware Fortinet Dell NICHE PLAYERS COMPLETENESS OF VISION Source: Gartner (July 2014) Trend Micro Clearswift Watchguard Technologies 2 Proofpoint VISIONARIES As of July 2014
5 security Advanced Defense Systems The goal of the Corero First Line of Defense security layer is to protect the customer s network infrastructure, online services and confidential data against DDoS attacks. Corero solutions are designed to be always on providing automatic attack mitigation with continuous threat visibility and network forensics. The Corero First Line of Defense solution provides comprehensive, real-time DDoS protection against the latest breed of attacks, including network and application layer DDoS attacks, volumetric, multi-vector attacks and access attempts from IP addresses with a bad reputation or from unwanted geo-locations. These varied cyber-threats have the potential to challenge traditional network security defenses and compromise networks. Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative First Line of Defense DDoS protection solutions. Corero SmartWall Threat Defense System provides: real-time protection against a continuously evolving spectrum of DDoS attacks that have the potential to impact any Internet connected business; opportunity to enhance defense-in-depth security architectures with an important additional layer of security capable of inspecting traffic arriving from the Internet and alerting and or blocking attack traffic before it impacts your environment. ENTERPRISE SERVICE PROVIDER ENTERPRISE SERVICE PROVIDER SERVICE PROVIDER ENTERPRISE ENTERPRISE SERVICE PROVIDER ENTERPRISE HOSTING PROVIDERS & DATA CENTERS ENTERPRISE ENTERPRISE ENTERPRISE HOSTED SITES CO/LO PRIVATE CLOUDS The SmartWall Network Threat Defense Appliance can be deployed to protect both infrastructure and cloud resources 3
6 security Intelligent Next-Generation Firewall Pioneering a real-time data analytics approach to Next Generation Firewall, Hillstone Networks provides advanced threat and vulnerability protection across the virtualized data center and enterprise in the cloud era. Hillstone Networks has over 10,000 customers worldwide which rely on a proven high performance network security solutions, including Fortune 500 companies, higher education, financial institutions and service providers. Solutions: Intelligent Next-Generation Firewall Data Center Firewall Hillstone Networks is selected in 2014 Gartner Enterprise Firewall Magic Quadrant. Hillstone Networks is ranked #2 in Chinese UTM market by IDC and is named NGFW Technology Leadership Award by Frost&Sullivan in
7 security encryption and Data protection Voltage Security is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption, tokenization and key management solutions, enabling customers to effectively combat new and emerging security threats. Voltage Security powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements. Solutions: Voltage Secur Voltage SecureData Enterprise Leading companies, including those in Financial Services, Health Care, Retail, Telecommunications, Manufacturing, Media, Government, Defense, Oil and Gas, and Education, use Voltage solutions for: o o o o Protecting data across mobile platforms Securing data as it moves into the cloud Protecting Big Data environments Regulatory Compliance Voltage SecureData Sandbox Data-centric Protection for Test and Development Voltage SecureData Payments Voltage SecureData Web Voltage SecureFile 5
8 security Data Security Manager and Encryption The Vormetric Data Security Platform delivers the data-at-rest security capabilities that your organization needs to safeguard data-at-rest, wherever it resides. The platform consists of several products that share a common, extensible infrastructure. The solution solves security and compliance challenges with data-at-rest encryption, integrated key management, privileged user access control, and security intelligence logging. Unstructured Files Structured Databases Transparent Encryption ApplicationLayer Big Data Cloud Vormetric Data Security Manager Key Management Privileged User Access Control Vormetric Data Security Platform Delivers Data-at-Rest Security at the Lowest Total Cost of Ownership 6 Vormetric Data Security Manager centrally manages policies, keys, and collection of security intelligence for the Vormetric Data Security Platform. Vormetric Transparent Encryption secures any database, file or volume across your enterprise without changing applications, infrastructure or user experience. Vormetric Application Encryption provides a simple framework to deliver application-layer encryption such as column-level encryption in databases or encrypt specific fields in files. Tokenization Data Masking Security Intelligence Solutions: Vormetric Key Management centralizes the management of KMIP and Transparent Data Encryption (TDE) Keys as well as secure storage of certificates. Vormetric Security Intelligence logs combined with a Security Information Event Management Systems (SIEM) can accelerate the detection of APTs and Insider Threats. In addition, satisfy compliance and regulatory audits with the use of these same logs.
9 security Identity and Access Management Versatile Security provides enabling IT security products centered on the usage of security devices such as smart cards. Companys solutions enable the customers to securely authenticate, issue and manage user credentials more cost efficiently than other solutions on the market. Versatile Security focuses on developing products with the following attributes: Versatile Security is an Identity and Access Management (IAM) provider focusing on management of access enabling devices: smart cards, mobile, tablets, virtual and RFID/NFC devices. o o o o o Fast installation and integration No or limited need of dedicated hardware Intuitive and efficient user interface Highest security levels No hidden costs Solutions: vsec:cms vsec:id vsec:mail Smart Cards Virtual Smart Cards 7
10 security Incident Response Platform Resilient Systems provide an incident response platform which is collaborative with workflows, intelligence and deep-data analytics to react better, faster and smarter to threats or incidents. Incident Response Platform produces and manages instant incident response plans. Together with its Security and Privacy modules, it provides IR teams with best-practice action plans and flexible workflows. It's also agile, allowing teams to modify their response to suit organizational needs, and continues to adapt in real time as incidents evolve. Solutions: Security Module Resilient s Security Module offers a powerful foundation for response planning, management, and mitigation. Its dynamic actions plans, automated intelligence feeds, and comprehensive reporting make big teams teams better, and small teams big. It houses best practices on how to deal with nearly every type of incident, providing a dynamic instruction set that can lead a team through the most effective path to respond. The Resilient platform can easily be customized to support an organization's unique requirements without requiring specialized skills or programming expertise. Privacy Module Based on an industry-leading knowledgebase of global regulatory requirements, Resilient s Privacy Module provides an instant, highly customizable platform for breach preparation, assessment, and management turning a lengthy, tedious, and expensive process to one that is efficient, compliant, and always up to date. Action Module Resilient's Action Module provides an automatic, fast, and flexible way for organizations to act on incidents. It synthesizes data from detection, ticketing, and forensic systems to provide critical real-time information so that teams respond better and faster. Organizations can fine-tune and streamline response processes without custom development or specialized programming skills. Prepare Run simulations to train the team Escalate events from existing systems 8 Assess Manage Mitigate Enrich and evaluate events against Best practices Regulatory requirements Threat intelligence Coordinate efforts Assign tasks Share incident status Report on progress Take action and refine process Implement mitigation Document performance Conduct postmortems
11 identity Identity management is one of the most important components of any organization's security infrastructure. In any organization information assets must be accessible only to individuals who are granted explicit entitlements to specific information. Shifra has a strong IAM solutions portfolio which will help to set and improve the mechanisms by which organization digitally identifies individuals, assigns privileges, monitors access and data usage, maintains separation of duties, and provides end-to-end audit-ability of this infrastructure. Solutions we provide: Strong Authentication Secure Online Banking Privileged Access Management Single Sign On Identity-as-a-Service (IDaaS) Ideal Lifecycle Management 9
12 identity Data protection and authentication Gemalto Identity & Access Solutions Gemalto solutions respond to the needs for strong authentication, data loss prevention, compliance to governmental security directives and the growing demand for qualified digital signature. SafeNet Data Protectkon & Software Monetization Solutions Gemalto security solutions enable Enterprise organization to encrypt. manage, and control access to sensitive information while our software monetization solutions enable Software Publishers to maximize the profitability of their applications. SSO & Access Management Service Software Smart Cards Enterprise Authentication Software Monetization Data Encryption Tokens Readers 10
13 identity R Unified Identity Management for Data Center, Cloud and Mobile Solutions: Centrify provides unified identity management across data center, cloud and mobile environments that results in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify s integrated identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions reduce costs and increase business agility and security by leveraging an organization s existing identity infrastructure to enable single sign-on, role-based access control, privileged identity management, auditing and compliance. Centrify Server Suite Centrify User Suite Standard Edition SaaS Edition Identity consolidation and privileged access management across Windows, Linux, and UNIX Single sign-on and unified management for cloud and mobile apps and devices Enterprise Edition Mac Edition Detailed auditing of privileged user sessions on Windows, Linux and UNIX Centralized security and management for Macs and mobile devices Platinum Edition Premium Edition Dynamic isolation systems SaaS and Mac Editions combined with mobile security management segmentation and of cross-platforms Application Edition Secure, centralized single sign-on to on-premises business applications More than 5,000 customers have deployed Centrify on millions of server, application and mobile device resources to optimize costs, agility and security. With Centrify, organizations are reducing their costs associated with identity lifecycle management and compliance by over 50%. 11
14 identity Identity and Access Management Evidian offers a complete, integrated and modular solution for digital identity management and access governance compatible with their security policies and the new regulatory requirements. Solutions: Enterprise Single Sign-On Strong passwords with no password-typing Enterprise SSO for mobile Solution for Android SSO and IOS SSO Web access management Portal security and web single sign-on Evidian sectoral approach offers organizations from all sectors an implementation of solutions that is adapted to each profession. For Evidian identity and access management is a major building block to ensure the security of information systems. To get the full benefit of it, the identity and access management system must gain adhesion from users and professions and offer tools for technical managers that are adapted to new usage scenarios and to the development of cloud services. 12
15 identity Identity and access Depro vis Airports Network Mobile perimeter Application Connected cars Cloud rmi ssio n s API Au Cards & accessories Professional Business Services Services n ti o th Telecom Licenses Healthcare Public Sector Trust Centers is a e Pe Government Support & Maintenance Universities Data Secure print Internet of Things Ports On-premise vic Today Security provicers/ Parolling Industry Digital Access Smart premises ser Yesterday Physical Access Card perimeter Vending What nexus offers Provision ing g nin io S elf- nexus customers include major corporations, mid-market players and government agencies who all have one thing in common: they rely on the Internet and the latest IT resources to effectively manage sensitive data. The nexus Dynamic Identity Platform solution enables them to take control of their digital identities and turn complexity and change into allies for a successful future. What customers need ntication the Au nexus is a leading and fast-growing international provider of IT security solutions. nexus key competence is Identity and Access Management (IAM): Company offers solutions, products and services for securing the identity of persons, objects or transactions both in the digital and the physical world. or Financial Services Subcriptions Banking Industry bodies nexus offers a full identity lifecycle solutions for converged digital and physical access Solutions: Tomorrow Identity Management Certificate and Key Management Authentication and Access Management Hardware and Cardware 13
16 mobility As businesses develop, their networks must grow with certain priorities in mind: core efficiency, vigilant security and the ability to go wireless and mobile. Shifra offerings help organizations to unify their business network, maximize security and efficiency. Solutions we provide: Enterprise Wireless Access Bring Your Own Device Wifi Monetization Guest Access Management Network Access Control 14
17 mobility Controller-less Wi-Fi and Cloud-enabled Networking for the Enterprise Aerohive is an innovative enterprise mobility company. Aerohive solutions enable enterprises to leverage the power of mobility to increase productivity, engage customers and grow their business. Companys proprietary mobility platform utilizes the cloud and a distributed, controller-less architecture to deliver unified, intelligent, simplified networks that can be cost-effectively deployed. The scalability and flexibility of the platform makes enterprise mobility available to organizations regardless of their level of IT resources and enables a consistent network architecture to be deployed across enterprises of all sizes. Mobility has become too complicated for many organizations and to address this Aerohive has focused on simplifying enterprise mobility with cloud-managed, unified mobility platform and built out a broad, integrated platform that includes: A complete, mobility-centric network access infrastructure including Controller-less Wi-Fi, access switches, branch routers, and client management agents Cloud-based management that dramatically simplifies IT operations Mobility applications that capture important contextual end-user data from our mobility platform and provide new business insights and analytic capabilities Products: Access Points Routers Switches Network Management Cloud Services Platform Applications 15
18 mobility Wi-Fi Hotspot Management Cloud4Wi provides an innovative cloud Wi-Fi platform for managing and monetizing Wi-Fi services. Cloud4Wi s platform enables venues to be rewarded for Wi-Fi services offered to customers by providing access to the world s first Wi-Fi marketplace. It includes every tool that venues need to manage and monetize their Wi-Fi services. Using an easily customizable splash portal and powerful proximity, advertising, social media and analytics applications, venues can engage their customers and generate additional revenues over their Wi-Fi network. Solutions: Wi-Fi Hotspot Management Engaging Marketing Apps Powerful Analytics Leading telecommunications and networking players, system integrators and Wi-Fi vendors have chosen Cloud4Wi to better serve their most demanding and enterprising customers who are searching for ways to maximize and/or offset their Wi-Fi investments. 16
19 mobility Advance Threat Detection Bradford Networks is the leading provider of rapid threat response solutions that minimize the risk and impact of cyber threats. The company s patented Network Sentry solution enables Cyber Security Teams to: Continuously assess the risk of every user and endpoint on the network Automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business. Bradford Networks network security solutions are used by more than 900 enterprise customers worldwide in markets such as healthcare, financial services, retail, government, education and more. INTEGRATION PLA GE TF O E ORK S NTRY/NA W C ET N ARCHIVE INVENTORY OF NTRY/AN K SE AL YT OR W HISTORICAL S IC LIVE NE T AR RM SM D TE INVENTORY OF NETWORK NETWORK CONNECTIONS CONNECTIONS ARCHIVE NE T WO R K S E N T RY /R TR 17
20 R 18