Tag Archives: Business

Panda Security and Deloitte Have Exciting Announcement for the Gartner Summit

Following the success of the Gartner Security & Risk Management Summit in the US, Panda Security will also be participating in the London conference held on 18-19 September 2017. The summit will address the major challenges facing IT security leaders today. Analysts, panellists, and presenters will offer proven practices, technologies and methods to help adjust to the digital transformation and managing the increase in cybersecurity risks.

Panda Security will discuss how to protect your business with Adaptive Defense, the new cybersecurity model. We will be at Booth #S24.

In addition to sharing experiences at stand S24, we will be giving a joint presentation in conjunction with Deloitte. Juan Santamaría, General Manager of Panda, and Edward Moore, Associate Director of Cybersecurity at Deloitte EMEA, will discuss the fundamentals of cyberdefense for companies. In a talk titled ‘From Incident Response to Continuous Response Management, Building Resilience in Organizations’, we will discuss how to avoid economic losses and reputational damages brought about by cyberattacks such as ransomware.  The session will be held on Tuesday 19 September, from 10:35-10:55 in the Solution Showcase Theatre on Level 1.

As 100% prevention is not possible, organizations must continually improve its detection and incident response capabilities to significantly reduce the probability of experiencing a damaging breach.

Learn from the directors of Panda Security and Deloitte EMEA how to maximise returns on your company’s investments using the latest resilience practices.

Adaptive Defense, the Common Link Between Deloitte and Panda Security

Businesses are currently facing unprecedented challenges as they process the large volumes and high speeds of modern digital interactions. With exponential increases in attacks originating from unknown threats (up more than 40% from last quarter alone), it’s logical to conclude that companies need to be doing more to reinforce their security and control. It’s for this reason that Panda Security and Deloitte EMEA have created a Cyber Alliance to provide an integrated, dynamic, and adaptive security ecosystem.

At the heart of this agreement is Adaptive Defense, a managed cybersecurity service based on continuous monitoring of all active processes, with automatic classification via artificial intelligence, and behaviour analysis by Security Operation Center experts. This ecosystem allows organization to become more resilient and reduces significantly the probability of experiencing a damaging breach.

You can see here further details on the joint Panda Security and Deloitte talk and add to your calendar for the Gartner Security & Risk Management Summit here.

The post Panda Security and Deloitte Have Exciting Announcement for the Gartner Summit appeared first on Panda Security Mediacenter.

Read More

Enterprise Security in the Age of Advanced Threats

panda-security-webinar

The malware and IT security panorama has undergone a major change, and enterprise security will never be the same. Hackers have improved drastically, both in terms of volume and sophistication, new techniques are allowing threats to remain on corporate networks for much longer periods than ever before.

Webinar  on the topic presented by Panda’s own Luis Corrons, Technical Director of PandaLabs.

How Predictive Intelligence Helps to Protect Companies

The task of protecting an enterprise is a challenge because it has hundreds of thousands of computers in its network; and a criminal just needs to compromise one of them to succeed. Security companies have working for decades now to advance security to ensure there is never one computer infected.

In the beginning, it was easy, the number of threats was very low, so being able to identify all threats was enough, computers were safe. Some of those threats were complex causing a nightmare for antivirus companies, as it could take several days, even weeks, for the most expert researchers just to create a detection for them. The creators of these viruses were people trying to show off their abilities, how good they were, and that was it, there was no other ulterior motive.

As the internet rose, there became a clear ulterior motive: money. Once cyber-criminals figured out how to benefit financially from these attacks, things really took off, and security companies, once again, had to adjust.

The number of new threats created is growing exponentially. In the old days a virus could take weeks or months to travel from LA to NY, now in a few seconds a virus could go from Washington DC to Tokyo.

Traditional anti-virus approaches included traditional blacklisting and whitelisting. Both blacklisting and whitelisting worked well for a while, but in the age of advanced threats, they can no longer be counted on. Cyber-criminals can try and fail a million times, but as soon as they get it right once, they win. It’s not a level playing field, and security solutions need to evolve to get ahead.

It is an uphill battle for security vendors, but as an industry, we know what it takes to combat the most sophisticated cyber-attacks. Now, it’s a matter of execution, and enterprises recognizing how important security is to their business objectives.

 

The post Enterprise Security in the Age of Advanced Threats appeared first on Panda Security Mediacenter.

Read More

A dating site and corporate cyber-security lessons to be learned

panda-security-protection-data

It’s been two years since one of the most notorious cyber-attacks in history; however, the controversy surrounding Ashley Madison, the online dating service for extramarital affairs, is far from forgotten. Just to refresh your memory, Ashley Madison suffered a massive security breach in 2015 that exposed over 300 GB of user data, including users’ real names, banking data, credit card transactions, secret sexual fantasies… A user’s worst nightmare, imagine having your most private information available over the Internet. However, the consequences of the attack were much worse than anyone thought. Ashley Madison went from being a sleazy site of questionable taste to becoming the perfect example of security management malpractice.

Hacktivism as an excuse

Following the Ashley Madison attack, hacking group ‘The Impact Team’ sent a message to the site’s owners threatening them and criticizing the company’s bad faith. However, the site didn’t give in to the hackers’ demands and these responded by releasing the personal details of thousands of users. They justified their actions on the grounds that Ashley Madison lied to users and didn’t protect their data properly. For example, Ashley Madison claimed that users could have their personal accounts completely deleted for $19. However, this was not the case, according to The Impact Team. Another promise Ashley Madison never kept, according to the hackers, was that of deleting sensitive credit card information. Purchase details were not removed, and included users’ real names and addresses.

These were some of the reasons why the hacking group decided to ‘punish’ the company. A punishment that has cost Ashley Madison nearly $30 million in fines, improved security measures and damages.

Ongoing and costly consequences

Despite the time passed since the attack and the implementation of the necessary security measures by Ashley Madison, many users complain that they continue to be extorted and threatened to this day. Groups unrelated to The Impact Team have continued to run blackmail campaigns demanding payment of $500 to $2,000 for not sending the information stolen from Ashley Madison to family members. And the company’s investigation and security strengthening efforts continue to this day. Not only have they cost Ashley Madison tens of millions of dollars, but also resulted in an investigation by the U.S. Federal Trade Commission, an institution that enforces strict and costly security measures to keep user data private.

What can be done in your company?

Even though there are many unknowns about the hack, analysts were able to draw some important conclusions that should be taken into account by any company that stores sensitive information.

·  Strong passwords are extremely important

As was revealed after the attack, and despite most of the Ashley Madison passwords were protected with the Bcrypt hashing algorithm, a subset of at least 15 million passwords were hashed with the MD5 algorithm, which is very vulnerable to bruteforce attacks. This probably is a reminiscence of the way the Ashley Madison network evolved over time. This teaches us an important lesson: No matter how hard it is, organizations must use all means necessary to make sure they don’t make such blatant security mistakes. The analysts’ investigation also revealed that several million Ashley Madison passwords were very weak, which reminds us of the need to educate users regarding good security practices.

·  To delete means to delete

Probably, one of the most controversial aspects of the whole Ashley Madison affair is that of the deletion of information. Hackers exposed a huge amount of data which supposedly had been deleted. Despite Ruby Life Inc, the company behind Ashley Madison, claimed that the hacking group had been stealing information for a long period of time, the truth is that much of the information leaked did not match the dates described. Every company must take into account one of the most important factors in personal information management: the permanent and irretrievable deletion of data.

·  Ensuring proper security is an ongoing obligation

Regarding user credentials, the need for organizations to maintain impeccable security protocols and practices is evident. Ashley Madison’s use of the MD5 hash protocol to protect users’ passwords was clearly an error, however, this is not the only mistake they made. As revealed by the subsequent audit, the entire platform suffered from serious security problems that had not been resolved as they were the result of the work done by a previous development team. Another aspect to consider is that of insider threats. Internal users can cause irreparable harm, and the only way to prevent that is to implement strict protocols to log, monitor and audit employee actions.

It is an ongoing effort to ensure the security of an organization, and no company should ever lose sight of the importance of keeping their entire system secure. Because doing so can have unexpected and very, very expensive consequences.

The post A dating site and corporate cyber-security lessons to be learned appeared first on Panda Security Mediacenter.

Read More

Panda Security, leader in Gartner’s Peer Insights program

panda-adaptive-defense

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational damage stemming from cyber-threats, and how the new protection model leveraged by Panda Adaptive Defense and Adaptive Defense 360 can help companies reinforce their IT security posture by classifying and monitoring all processes running on their network. Panda’s new security approach provides complete endpoint visibility and allows organizations to block security attacks and respond to them immediately, implementing more robust security measures to prevent further incidents. This is not just our opinion but the opinion of our customers as well, as shown by the fact that 96 percent of participants in IT software and services review platform Gartner Peer Insights are recommending Panda’s advanced cyber-security solutions to other companies.

But, what is Gartner Peer Insights?

Peer Insights is an online platform of ratings and reviews of IT software and services. The reviews are written and read by IT professionals and technology decision-makers like you.

The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective unbiased feedback from their customers.

“A product taht is great on visibility and proactive protection even againts direct attack. During the POC and Implementation, everything was easy. Even until now, the support is excellent.” – IT Assistant Manager in the Education Industry.

In this regard, Adaptive Defense, Panda Security’s Endpoint Detection and Response (EDR) solution, is the best rated software and receives 28 percent of all reviews submitted by participants. The best-rated features of Panda’s software include its detection, attack containment, remediation and investigation capabilities.   Additionally, Adaptive Defense’s 100% Attestation Service and the fact that it is cloud-based provide great value for its total cost of ownership, allowing customers to save time and money.

Outstanding capabilities to detect attacks and malware that we never though could escape. This tool does everything we need it to do,and as long as it continues to help us save time, I will continue recommending it.- Responsible For Systems in the Government Industry. 

Panda’s EPP technologies, represented by Panda Endpoint Protection, are also highly rated in the reviews. The fact that the solution can be managed from a single, central Web-based console at any time, from anywhere, is highly praised by IT security professionals,

Companies of all sizes and industries say they have become more resilient to cyber-attacks and give Panda a 4.7 out of 5 overall rating, outscoring all other security vendors.

I’d like to participate in the program, but who can write a review?

Reviews must be completed by people working with Panda Endpoint Protection or Panda Adaptive Defense/Adaptive Defense 360 on a daily basis, or people involved in the purchasing decision.

Panda Adaptive Defense delivers on its commitment to provide complete, integrated protection to users, and is at the forefront of advanced cyber-security solutions. It’s not just us who say so.Are you using Panda Endpoint Protection, Panda Adaptive Defense or Panda Adaptive Defense 360 in your organization? Would you like to share your experience with your peers? Click here to access Gartner’s Peer Insights platform and share your cyber-security experience.

The post Panda Security, leader in Gartner’s Peer Insights program appeared first on Panda Security Mediacenter.

Read More

Hotspot Shield VPN Accused of Spying On Its Users’ Web Traffic

hotspot-shield-vpn-privacy

Privacy” is a bit of an Internet buzzword nowadays as the business model of the Internet has now shifted towards data collection.

Although Virtual Private Network (VPN) is one of the best solutions to protect your privacy and data on the Internet, you should be more vigilant while choosing a VPN service which actually respects your privacy.

If you are using popular free virtual private networking service Hotspot Shield, your data could be at a significant risk.

A privacy advocacy group has filed a complaint with the Federal Trade Commission (FTC) against virtual private networking provider Hotspot Shield for reportedly violating its own privacy policy of “complete anonymity” promised to its users.

The 14-page-long complaint filed Monday morning by the Centre for Democracy and Technology (CDT), a US non-profit advocacy group for digital rights, accused Hotspot Shield of allegedly tracking, intercepting and collecting its customers’ data.

Developed by Anchorfree GmbH, Hotspot Shield is a VPN service available for free on Google Play Store and Apple Mac App Store with an estimated 500 million users around the world.

Also Read: Secure VPNs (Get Lifetime Subscription) To Prevent ISPs From Spying On You

VPN is a set of networks conjugated together to establish secure connections over the Internet and encrypts your data, thereby securing your identity on the Internet and improving your online security and privacy.

The VPN services are mostly used by privacy advocates, journalists, digital activists and protesters to bypass censorship and geo-blocking of content.

Hotspot Shield does just Opposite of What All it Promises

The Hotspot Shield VPN app promises to “secure all online activities,” hide users’ IP addresses and their identities, protect them from tracking, and keep no connections logs while protecting its user’s internet traffic using an encrypted channel.

However, according to research conducted by the CDT along with Carnegie Mellon University, the Hotspot Shield app fails to live up to all promises and instead logs connections, monitors users’ browsing habits, and redirects online traffic and sells customer data to advertisers.

“It is thusly unfair for Hotspot Shield to present itself as a 48 mechanism for protecting the privacy and security of consumer information while profiting off of that information by collecting and sharing access to it with undisclosed third parties,” the CDT complaint reads. 

“Consumers who employ Hotspot Shield VPN do so to protect their privacy, and Hotspot Shield’s use of aggressive logging practices and third-party partnerships harm its consumers’ declared privacy interests.”

Hotspot Shield also found injecting Javascript code using iframes for advertising and tracking purposes.

Reverse engineering of the apps source code also revealed that the VPN uses more than five different third-party tracking libraries.

Researchers also found that the VPN app discloses sensitive data, including names of wireless networks (via SSID/BSSID info), along with unique identifiers such as Media Access Control addresses, and device IMEI numbers.

Also Read: Secure VPN Services — Get Up to 91% Discount On Lifetime Subscriptions

The CDT also claims that the VPN service sometimes “redirects e-commerce traffic to partnering domains.”

If users try to visit any commercial website, the VPN app redirects that traffic to partner sites, including ad companies, to generate revenue.

“For example, when a user connects through the VPN to access specific commercial web domains, including major online retailers like www.target.com and www.macys.com,the application can intercept and redirect HTTP requests to partner websites that include online advertising companies,” the complaint reads.

The CDT wants the FTC to start an investigation into what the Hotspot Shield’s “unfair and deceptive trade practices” and to order the company to stop mispresenting privacy and security promises while marketing its app.

Powered by WPeMatico

Protecting your business from the next ransomware attack

With more than 120 million ransomware samples in 2015 alone, now as of 2017, it has become one of the fastest growing and lucrative threats to businesses on the web.

Ransomware disguises itself by hiding inside of email and website links and then hijack your computer until you agree to pay the ransom. Prevention is possible and important to avoiding these types of attacks. Our AVG Business survival guide will help you protect yourself and your business before the next threat occurs.

 

Photo credit: Unsplash photographer Illya Pavlov

Read More

Protecting your business from the next ransomware attack

With more than 120 million ransomware samples in 2015 alone, now as of 2017, it has become one of the fastest growing and lucrative threats to businesses on the web.

Ransomware disguises itself by hiding inside of email and website links and then hijack your computer until you agree to pay the ransom. Prevention is possible and important to avoiding these types of attacks. Our AVG Business survival guide will help you protect yourself and your business before the next threat occurs.

 

Photo credit: Unsplash photographer Illya Pavlov

Read More

WannaCry and Bring Your Own Device – What next for SMBs?

Bring your own device policy develops a need for key best protection practices after WannaCry ransomware attacks creates an immediate demand from businesses for stronger cyber security and patch installations.

After WannaCry saw businesses worldwide held to ransom, the need for better cyber security and installing the latest software patches has become a high priority.

To protect from cyber-attacks, best practice recommends updating software, running antivirus, and backing up data. But this is not always quick and easy to do – especially if the business has a bring your own device (BYOD) policy in place.

Many employees now use their personal devices for business. This offers the convenience of being able to work remotely and reduce the cost of managing IT for the business. But because it’s a personal device, it is also natural for employees to want to keep control of it.

In other words, how can a balance be struck between personal privacy and protecting business systems and data which the device might have access to?

One solution

With the agreement of the employee, businesses can use Mobile Device Management (MDM) software to check that personal devices used for work, such as smartphones, tablets, and laptops, are updated.

However, this software can also track a device’s location and potentially wipe its data remotely, if it is stolen for instance. This presents something of a dilemma for the employer and employee.

There is a risk that employees would feel pressured to agreeing to such software being used – even if for positive reasons – or that it is implicitly giving the employer permission to spy on them.

Personal control

The major anxiety for employees surrounding MDM is the danger of either losing personal data or it being seen by other people outside of their private circle. If the device was stolen and the company chose to wipe it, personal content like family photographs, could be destroyed alongside business data.

The concern for business is that by not having such controls in place, they may not be able to prevent unauthorized access to business data or systems. Regarding their employees, the concern for business is that their anxieties are not unfounded.

Even a simple connection to a company system like Microsoft Exchange ActiveSync means that IT staff could remove or delete personal data from an employee’s phone. MDM potentially increases this access to make photographs, private documents and browsing history accessible to employers too.

Furthermore, if the business faced litigation or were involved in an official investigation of some sort, the employee’s phone, along with their personal content, might be seized and the content viewed by investigators, lawyers, a jury and judges.

Gaining trust

While employees’ concerns are valid, if the business clarifies what the MDM does and why it is important, this could go some way to building trust and agreement.

While small businesses might not have a dedicated IT specialist or the technical know-how to implement MDM, having a brief and honest chat with employees is unlikely to be enough to allay their concerns.

Developing an acceptable use policy for BYOD is best practice, but technical language or legalese could further confuse employees who might not quite understand what they are agreeing to. What is required are BYOD policies that are easy to understand, transparent and updated regularly to maintain their effectiveness.

Balance

While it is easy to frame the concerns around MDM as a conflict between maintaining personal privacy and keeping business systems safe and data confidential, the reality is different.

Attacks like WannaCry pose a threat to both business and individuals because any of the information on an unprotected device could be held to ransom, stolen or corrupted.

Security is not something just for IT staff to deal with, it is something everyone has to be involved in for it to succeed. This will require regular and practical training to boost understanding and develop trust. With that in place, employer and employees are more likely to work together to combat potential cyber-attacks in the future.

 

Three steps towards cyber safety for SMBs:

  1. Assess yourself

AVG’s Small Business IT Security Health Check is a starting point to assess how strong the digital security of your business is. The results point out practical steps SMBs can take to re-assess cyber security.

  1. Take advice

Check the best practice for your region. Official advice recommendations from US-CERT include applying relevant patches, enabling strong spam filters, and ensuring antivirus software is set to scan regularly.

  1. Educate yourself

While BYOD has many benefits, understanding the pitfalls is essential to building a successful policy. AVG’s free Bring Your Own Device eBook will guide SMBs and help to construct a BYOD policy that is beneficial for everyone.

Learn more about how to stay protected from ransomware in our SMB survival guide.

Read More

Secure VPN Services With Lifetime Subscription (Save up to 95%) – Limited Time Deal

secure-best-vpn-service

PRIVACY – a bit of an Internet buzzword nowadays, because the business model of the Internet has now shifted towards data collection.

Today, most users surf the web unaware of the fact that websites and online services collect their personal information, including search histories, location, and buying habits and make millions by sharing your data with advertisers and marketers.

If this is not enough, then there are governments across the world conducting mass surveillance, and hackers and cyber criminals who can easily steal sensitive data from the ill-equipped networks, websites, and PCs.

So, what’s the solution and how can you protect your privacy, defend against government surveillance and prevent malware attacks?

No matter which Internet connection you are using to go online, one of the most efficient solutions to maximize your privacy is to use a secure VPN service.

In this article, we have introduced two popular VPN services, TigerVPN and VPNSecure, which help you in many ways. But before talking about them, let’s dig deeper into what is a VPN, importance of VPN and why you should use one.

What is a VPN & Why You Should Use It?

A VPN, or Virtual Private Network, is nothing but an encrypted tunnel between you and the Internet.

Once you connect directly to your VPN service, every Internet browsing activity of yours will go through the VPNs servers and blocks third parties, including government and your ISP, from snooping on your connection.

  • Secure and Encrypted Web Browsing: VPNs enhance online security by keeping your data secured and encrypted.
  • Online Anonymity: VPNs help you browse the Internet in complete anonymity so that no one can track the origin of your Internet connection back to you.
  • Prevent Data & Identity Theft: VPNs encrypt all data transferred between your computer and the Internet, allowing you to keep your sensitive information safe from prying eyes and significantly reducing the risk of security breaches and cyber attacks.
  • Unblock Websites & Bypass Internet Restrictions: VPN essentially hides your IP address, so your visits to any restricted sites do not register with the third-party, including your government or ISP, trying to block you, ensuring you enjoy the online freedom of speech.
  • Hide Your Browsing History From ISP: VPNs stop your ISP from logging your web visit, as the spying ISP will not be able to see what you are visiting on the Internet.
  • Multiple Device Supported: Many VPN services usually support multiple devices and work on all operating systems, such as Windows, Mac, Linux, Android, and iOS. With multiple device support, you can set up your PC, work computer and smartphone to access one VPN at the same time.

Get Best VPN Service — Lifetime Subscription


Dozens of companies today sell VPN services, and you can find plenty of reviews that can help you choose one.

But make sure to look for a VPN service that includes a large number of servers distributed worldwide, type of encryption, their privacy policies, speed and price.

If you are looking for an excellent and secure VPN service to start with, below we have introduced two best deals from THN Store, offering popular VPNs at highly discounted prices with lifetime access.

VPNSecure: Lifetime Subscription

VPNSecure: Lifetime Subscription

If you’re searching for an affordable and cross-platform VPN service without any bandwidth limits, VPNSecure is the one you can trust on.

This premium VPN service is compatible with all operating systems, easy to use and setup offers lightning-fast connection and provides ultimate safeguards against hackers and cyber-thieves.

With strict no-log record policy, VPNSecure has many servers located in more than 46 countries and counting.

The VPNSecure Lifetime Subscription is available for just $39 at THN Deals Store, which without discount costs $450 — isn’t this excellent deal, a one-time flat fee for a lifetime VPN subscription.

TigerVPN: Lifetime Subscription

TigerVPN: Lifetime Subscription

TigerVPN comes with a right mix of security, usability, and features, and supports Windows, Mac, Android, and iOS. It provides military grade encryption to make sure your entire communication on the Internet is end-to-end secure and protected.

The service doesn’t allow anyone, including your ISP or the government, to monitor, target or even sell your internet activity. With TigerVPN, you can enjoy the benefits of unlocking geo-restrictions from content providers like Netflix, Youtube, and many others with unlimited access to 15 VPN nodes across 11 countries.

The TigerVPN Lifetime Subscription is also available for just $39 at THN Deals Store, which without discount costs $780 — that’s 95% off on its real value.

So, what you are waiting for? Grab your VPN Now!

Powered by WPeMatico

Synnex and Avast announce an exclusive internet security solutions partnership in Australia and New Zealand

Synnex announces an exclusive internet security solutions partnership with Avast to roll out the entire AVG security software portfolio by Avast to its channel partners in Australia and New Zealand.

 

Melbourne, Australia / Redwood City, California, May 10th, 2017

Synnex today announces an exclusive partnership with Avast, the global leader in digital security products for businesses and consumers. Synnex is rolling out the entire AVG security software portfolio by Avast to its channel partners in Australia and New Zealand.

Kee Ong, CEO, Australia and New Zealand, Synnex, said, “The exclusive partnership with Avast represents a strong offering in our security software and cloud services portfolio for ANZ.  Channel partners can leverage the extensive security solutions by Avast across SMB and Mobile Enterprise businesses. This represents many opportunities for our existing Mobile hardware vendors and channel partners to formulate bundled security solutions to drive additional revenue streams.”

Synnex partners can now extend their service offerings to include AVG’s managed workplace, RMM and antivirus protection software solutions, to help businesses protect their data and streamline their IT infrastructure. The move reinforces Synnex’s commitment to continue to invest heavily in its Channel Cloud marketplace and expanding its Cloud vendor portfolio.

Michael Tea, General Manager, Ecommerce & Cloud Services at Synnex, said, “We have been in discussions with Avast for well over 12 months and it’s been a long and fruitful road to formulate this exclusive partnership. We are excited to be launching with AVG Security products by Avast and are looking forward to extending the partnership to the rest of the APAC region. As part of our exclusivity, Synnex will also add another 1,500 AVG Partners to its valued reseller base.”

Out of a user base of 400 million Avast users worldwide, 160 million of them are mobile users. Avast has the most advanced threat detection network in the world. The security technology runs in the cloud, based on a vast machine learning network. Each of the endpoints acts as a sensor for malicious files and activities. When Avast’s artificial intelligence technology determines that a file is malicious, it pushes this information to their cloud servers, resulting in full protection of more than 400 million users, in nearly real time.

“SMBs face similar security challenges enterprises do, but often lack the time and resources needed to manage and secure their IT infrastructure, which is where our partners can help them,” said Erik Preisser, Senior Sales Director at Avast. “Synnex’s large IT channel footprint in Australia and New Zealand, as well as their high quality standards and capabilities to sell complex products will significantly help us expand our reach in the market.”

About Synnex

Synnex Australia Pty Ltd is the largest ICT distributor in the Australian market, providing quality branded computer, IT devices, telecom products, servers, components, peripherals, imaging and printing, consumables, networking, storage, software, enterprise solutions, volume licensing, security surveillance solutions, and Cloud services. Synnex Australia commits ourselves as a world-class leader in ICT distribution. Through its established strategic partnerships with leading ICT manufacturers, Synnex is dedicated to offering their customers a wide range of products and solutions backed by comprehensive infrastructure, knowledgeable support, competitive pricing and superior services. Synnex Australia Pty Ltd is a division of Synnex Technology International Corporation, the largest IT distribution company in the Asia Pacific region and ranked third largest worldwide. In Australia, Synnex services over 8,000 resellers, all business types in the IT industry businesses including SME Resellers, System Integrators, Computer Retailers, Original Equipment Manufacturers, Corporate Retailers, National Retailers and VARs.

For more information on Synnex, please visit www.synnex.com.au.

 

About AVG Business by Avast

Avast (http://www.avast.com), the global leader in digital security products for businesses and consumers, protects over 400 million people online. Offering products under the Avast and AVG brands, Avast protects data, devices, people from threats on the internet and the IoT threat landscape. The company’s threat detection network is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real time. The AVG Business by Avast portfolio provides solutions that secure, simplify and optimize the IT experience for SMBs worldwide.

AVG Business by Avast’s cloud and on-premise security solutions are tailored for the channel and include a remote monitoring and management platform with security built into the core. Channel partners are also supported by Avast’s comprehensive partner program which provides the tools and knowledge to help them sell AVG Business by Avast products.

Avast Media Contact:

XXX XXX, Avast PR Director

E-mail: xxx@avast.com

www.avast.com

Synnex Media Contact:

Michael Tea

E-mail: michaelt@au.synnex-grp.com

http://www.synnex.com.au/

Read More