2. TORNADO TECHNOLOGY
MISSION
TORNADO was set to provide
easy access to performance
and efficiency for the
Romanian market, offering its
business partners a strong,
long term relationship based
on trust.
VALUES
We build our company
guided by cornerstone
values in which we believe.
Our desire is to bring added
value both to our business
and relationship between
our companies.
2
3. l Professionalism and
Performance: We invest in
the personal and professional
development of our
employees, enlarging our
ability to motivate, to inspire
l Integrity and Consistency: and bring them to a higher
We are committed to level of involvement and
maintaining a trustworthy responsibility.
relationship, direct approach,
fairness and honesty in any
situation.
l Initiative and innovation:
WE BELIVE IN: We encourage imagination and
initiative in suggesting new
l Communication and things, creating and bringing
Feedback: We ask questions; novelty to the products, service
search for feedback; make and relationship we provide.
recommendations because
only by communicating we
will acknowledge each other’s
expectations, share experience
TECHNOLOGY CENTER
and reach our goals.
3
4. TECHNOLOGY CENTER
The TECHNOLOGY CENTER is designed to offer a professional environment
to deliver IT networking and security knowledge according to our vendors’
requirements and enable the partners to implement value added solutions
to end customers.
The certification training courses are offering a competitive edge to our
4 partners over competition, enabling them to secure the projects and to
increase their profitability.
5. We provide in our TECHNOLOGY CENTER a wide range of
accredited trainings:
l Avira - antivirus technologies;
l Barracuda - firewall, antispam, load balancing, link balancer, web
content filtering
l BlockMaster - secure USB solutions
l Brand Rex - communication infrastructure cabling solutions
l Cryptzone - encryption technologies
l Enterasys - switching, routing, wireless and management and
security
l Entrust - identity access management
l Extreme Networks - switching and wireless
l Huawei - switching, routing, unified communication, VOIP,
servers and storage, security, wimax;
l Ipoque - traffic management
l LanDesk - systems and security management: capturing
inventory, remote control, software distribution,
deploying patches, and working with Operating
System Deployment and Provisioning
TECHNOLOGY CENTER
l LogLogic - log management and business continuity
l PixAlert - data protection and illicit image detection
l Rapid7 - vulnerability management and penetration testing
l SonicWall - firewall, antispam, load balancing, web content
filtering and data back-up
l Transition Networks - industrial switching and media conversion
technologies
l WatchGuard - Unified Threat Management (XTM) technologies:
firewall, antivirus, antispam, IPS, load balancing, web
content filtering, application control, VOIP security,
Reputation Enabled Defense;
- content security (XCS) technologies: antivirus,
antispam, IPS, web content
filtering, application control,
Data Loss Prevention,
l Zyxel - switching and routing,
wireless, security, VOIP, fiber
access, wimax, media servers, 5
network management
6. PORTOFOLIO
Tornado Technology delivers a wide range of products and
technologies that recommends us a strategic provider for
networking and IT Security solutions.
Networking
Brand-Rex is a British supplier of structured cabling systems for offices and
datacenters: copper and fiber optic cables, patchpanels, high density cabinets, patch
cords and wall outlets seen.
Enterasys Networks, a Siemens Enterprise Communications Company, is a premier
global provider of wired (switching & routing) and wireless (access points &
controllers) network infrastructure and security management solutions (Security
Information & Event Manager - SIEM).
Extreme Networks offers Core and Aggregation switching, Wireless, Mobile Backhaul
products, Port Extenders, Security & Management Tools.
Huawei is a strategic supplier of mobile telecommunications infrastructure with
three core business segments: Telecom Networks, building telecommunications
networks; Global Services, offering global equipment, operational services, and
consulting services for enterprise customers; and Devices, manufacturing electronic
communications devices. Huawei delivers for Enterprise business network
infrastructure, fixed and wireless communication, data center and cloud computing.
Qubs is the first romanian networking Brand, launched in 2002 by Tornado. Qubs
product portfolio includes copper cables and patch cords, wall outlets and
connectors, metallic cabinets (Racks) & copper Patch Panels.
Transition Networks delivers a wide range
of Media Conversion, Switching, Connectivity,
Aggregation switches for enterprise and
industrial applications.
ZyXEL offers complete networking solutions
ranging from DSL customer premise
equipment, central office equipment, Internet
security appliances, switches, WLAN
equipment; network attached storage (NAS)
and centralized network management systems.
IT Security
Avira , offers antivirus professional solutions for workstations, file, mail and web
servers for Windows/Linux/Unix operating systems.
6
7. Barracuda offers products that protect organizations from threats over email, Web, and
InstantMesseging and loadbalancing/link balancing solutions.
Coperfasten (WebTitan/SpamTitan) offers comprehensive protection from email and web
based threats, including , viruses, Trojans, phishing, malware and other unwanted content
Cryptzone offers Policy Compliance, Content Security, Secure Access and Endpoint
Security products
Entrust solutions include strong authentication, fraud detection, digital certificates, SSL
and PKI.
Ipoque, provides deep packet inspection (DPI), bandwidth management, copyright
protection, QoS solutions for Internet traffic management and analysis.
LANDesk provides systems management, security management, service management,
asset management, and process management solutions to organizations.
Loglogic provides compliance (PCI, HIPAA, FISMA, ISO, ITIL, NERC & SO) and IT data
management products
PORTOFOLIO
Pixalert has innovative and advanced portfolio of critical data and image detection and
protection software solutions.
Rapid7 is the leading provider of Unified Vulnerability Management and Penetration
Testing Solutions.
SonicWALL providing services for network firewalls, UTMs (Unified Threat Management),
VPNs (Virtual Private Network), backup and recovery, and anti-spam for email.
Watchguard offers antivirus, antispam, IPS, firewall, VPN, application control, VoIP security,
Reputation Enabled Defence, Data Loss Prevention device solutions
Webroot offer SaaS products (web/email security service, email archiving) and endpoint
security software
Block master offers secure USB flash drivers, encryption data USB AND central USB
management products
7
8. NETWORKING
Brand Rex is Europe’s leading supplier of communication infrastructure cabling solutions, a niche provider of
extreme environment speciality cabling solutions, that design, develop, manufacture and support copper &
fibre cable and connectivity systems.
Copper Cabling Systems
Cat 5e, Cat 6, Cat 6A, Cat 7 and Cat7A advanced end-to-end cabling systems
Fibre Cabling Systems
Solutions for conventional cabling, centralised
fibre installations and telecom / local networks; full
range of premise distribution and loose tube fibre
optic cables; complete system includes fibre
connectivity, adaptors, patch cords and panels;
Unique Air Blown Fibre System allowing networks
to be easily and cost-effectively upgraded.
Data Centre Solutions
High Density Copper and Fibre Cabling Solutions
Unique Data Centre Solutions designed with an
emphasis on:
l minimising installation times
l maximising precious usable data centre space
l minimising footprint
Intelligent Infrastructure
SmartPatch Intelligent Infrastructure
Management System
Maximises network service availability and
efficiency
8
Enhances network security through
identification and isolation of unauthorised
users
9. Reliable, Innovative and
Customer-Focused
Enterasys Networks, a Siemens Enterprise
Communications Company, is a premier
global provider of wired and wireless
network infrastructure and security solutions.
Our solutions enable organizations to drive
down IT costs while improving business
productivity and efficiency through a unique
combination of automation, visibility and
control capabilities. Enterasys provides a
broad range of enterprise networking and
security solutions by technology and Enterasys has a rich history as a pioneer in the switching and
industry. routing market, dating back to 1998. Today's full portfolio of
wired/wireless network infrastructure and security solutions
leverages that experience and a robust technology patent
portfolio to provide built-in automation, visibility and control
capabilities to solve critical customer networking and
mobility challenges.
The company designs and manufactures all types of
NETWORKING
networking equipment including routers, switches, and
802.11 wireless access points and controllers.
In addition to hardware, the company also builds software for
managing and securing enterprise-class networks such as
Intrusion Prevention System, Network Access Control and
Security Information & Event Management (SIEM).
Product
categories switching and routing chassis
stackable
standalone
accessories
wireless access points
controllers
management
security network management 9
advanced security
applications
10. NETWORKING
Extreme Networks is a leader in providing enterprise and metro service solutions for open converged
networks.
Extreme Networks vision of a converged network is one where voice, video, data, and diverse applications and
services come together in the same network.
Extreme Networks are proud to be
among one of the first companies
to:
l Introduce Gigabit Ethernet
products that were tested at full
wire-speed with zero packet loss
l Offer patented quality of service
(QoS) capability on IP/Ethernet
networks
l Deliver carrier-class Ethernet for
metro area networks
l Deliver a unified solution that Switching Products
allows wired and wireless Core and aggregation switching solutions scale to solve tough voice
devices, applications and and security challenges with high availability, crystal clarity, and
equipment to share the same integrated security features. Edge switching solutions provide a
infrastructure and management powerful portfolio to support everything from basic connectivity to
tools advanced, high-speed services for demanding desktop applications.
l Deliver a truly modular
switching operating system for Mobile Backhaul Products
enterprises and metro service Extreme Networks E4G family enables mobile operators to deploy a
providers true 4G mobile backhaul network to address the current requirements
l Introduce a voice-class modular of 2G and 3G services while laying the foundation for a true 4G mobile
switch for the network edge broadband network through three key capabilities --- synchronization,
resiliency and performance.
Wireless Products
Scalable wireless LAN solutions are available for small to medium to
large enterprises. Extreme Networks wireless solutions offers world
class capabilities including comprehensive network-wide security,
enterprise grade voice services and unified policies and services across
wired and wireless networks. We enable the enterprise customer to
reduce the complexity for wireless network deployment and
management.
Operating Systems
ExtremeXOS is an open, extensible network operating system with a
10 modular design for high availability and application versatility.
11. Huawei is a leading global information and communications technology (ICT)
solutions provider. Through their dedication to customer-centric innovation
and strong partnerships, they have established end-to-end advantages in
telecom networks, devices and cloud computing. Huawei are committed to
creating maximum value for telecom operators, enterprises and consumers by
providing competitive solutions and services. Huawei products and solutions
have been deployed in over 140 countries, serving more than one third of the
world’s population.
Huawei's vision is to enrich life through communication.
Huawei has filed a total of 31,869 Chinese patents, 8,892 international patents
under the Patent Cooperation Treaty (PCT), and 8,279 overseas patents.
Major Products and Services
Huawei offers a broad range of end-to-end product portfolios, including:
NETWORKING
Routing and Switching
Wireless and Mobility
Network Security
Cloud Computing
Server and storage
Radio Access Networks
Video Surveillance
Unified Communcation and Collaboration
M2M (SCADA)
Applications and Software
Voice over Ip
Energy and Infrastructure
11
12. NETWORKING
Transition Networks, Inc. offers a full suite of fiber networking
products that enable you to deliver and manage your network traffic
reliably over fiber optics.
WHY TRANSITION NETWORKS?
Transition Networks has created a portfolio of fiber connectivity
hardware that makes networks perform better, faster, and more
reliably. Transition Networks offers a complete fiber connectivity
product portfolio designed to facilitate low-cost network evolution.
Media Conversion
Transition Networks brand of media converters make conversion
between disparate media types possible. The company designs and
markets these media conversion technologies across a broad
spectrum of networking protocols including Ethernet, Fast Ethernet,
ATM, Gigabit Ethernet, T1/E1, DS3, video, Power-over-Ethernet, and
more. Transition Networks offers its products in chassis, stand alone,
and PCI form factors.
Switching
The MILAN by Transition Networks switch line offers customers Industrial Grade Conversion
unique configurations and a high level of service and reliability, all
and Switching
while serving to ease the stress caused on networks by high-
Transition's industrial networking portfolio
bandwidth applications.
connects controlled office environments to
extended temperature, factory floor and
Carrier Grade Fiber Access outdoor industrial environments, including
Service Providers are constantly striving to meet growing broadband hazardous locations requiring Class 1 Div 2
demands and new service offering. Factors such as remote certified equipment.
management, SLAs, establishing QoS, and conserving fiber are
forcing Carriers to get more out of their network. With Transition's All Transition products include a lifetime
complete line of fiber Network Interface Devices (NIDs) including our warranty, without the fine print.
MEF 9 and 14 compliant Ethernet products, we're giving Service
Providers the chance to meet these demands head on and deliver l Fiber to Copper Media Conversion
mission critical applications with efficiency and reliability. l Managed and Unmanaged Switches
l Coarse Wave Division Multiplexing
(CWDM)
l Industrial Networking
l Security and Surveillance
l NICs, SFPs, and GBICs
12
l Power-over-Ethernet Switches
Converters and Accessories
13. Qubs, the first romanian networking
Brand, launched in 2002 by Tornado
Sistems, comes with a modern and
functional design and complies with
the new standards at competitive
prices.
Qubs product line covers
the following areas:
l complete LAN solutions for small
and medium sized companies
l home networking, offering
support for application/device
sharing or network games and
plug-and-play facilities
l wireless solutions for business
executives or special users on
the move where wires are not
an option
NETWORKING
Qubs product range
Passive equipment
l Metallic cabinets
l Patch panels
l Copper cables
l Fiber optic cables
l Outlets
l Tools & Devices
Active equipment Wireless equipment
l NICs l Access Point
l Switches l Ethernet adapters
13
l Routers l Antennas & Cables
l Media converters
14. NETWORKING
Founded in 1989 and set up in Taiwan, ZyXEL is now the leading provider of
complete broadband access solutions for service providers, as well as business
and home users.
ZyXEL solutions boast the latest, hottest networking features such as Triple Play,
Quality of Service (QoS), Network Security and Network Management. Both
corporate and home users can take advantage of ZyXEL products and services
to enjoy high quality, versatile media applications in a secure and manageable
networking environment.
Today, ZyXEL is one of the few companies in the world capable of offering
complete networking solutions ranging from DSL customer premise equipment,
central office equipment, Internet security appliances, switches, WLAN
equipment, network-attached storage and centralized network management
systems.
To Internet professionals around the world, ZyXEL is a synonymous with for
uncompromising quality and reliability. In fact, if you are enjoying convenient
and versatile online applications, they likely come from a ZyXEL solution.
With more deliverable information and better empowerment for your communication, ZyXEL products and services
can bring you, your business partners, friends and families together anytime, anywhere.
Built with rock-solid stability and security, the ZyXEL solutions are known for their innovative design that makes
your network more secure and efficient.
To us, creating more value for partners and customers with ingenious products and services is always the direction
we are heading.
With ZyXEL, the possibilities for your network are endless.
14
15. Avira, a company with
around 100 million
customers and 300
employees is a worldwide
leading supplier of self-
Avira offers a comprehensive security solution that protects developed security
businesses against viruses, worms, Trojans, rootkits, solutions for professional
ad/spyware, dialers and other malware. Independent tests and private use. With more
confirm the constantly high detection performance of the
than 25 years of experience,
engine on a regular basis and furthermore, the performance
is independently tested by the TÜV. the company is one of the
pioneers in this field.
Ten reasons ... why your business is better protected
with Avira.
1. Excellent detection rate based on inhouse virus labs,
where excellent virus researchers develop highly
efficient concepts and methods for malware detection
2. Reliable heuristic guaranteed using technology that
Avira has developed and optimized: the AHeAD
technology, an innovation for the heuristic detection
and defense of potential threats.
3. Low memory consumption using sophisticated
algorithms
4. Maximum security - thanks to the first-class heuristics of
the Avira AntiVir AHeAD technology, the security level does
IT SECURITY
not decrease noticeably even if the end-user does not
update his security solution automatically at hourly intervals
5. Everlasting pioneering spirit because Avira was one of
the first providers worldwide to include security solutions
for Unix in its portfolio and Avira for SAP Net-Weaver.
6. Unique product range with solutions for small, medium-
sized and large-scale and individual solutions for file, proxy
and mail server for Linux and Windows
7. Good price/performance ratio providing bundles
customized for schools, universities and public
institutions.
8. Individual support with real experts at customers’
disposal and no external support service providers
9. Long-term security because Avira is already working on
the protection against possible threats that could appear in
the future
10. Satisfied customers – 70 milions customers 15
16. IT SECURITY
Barracuda Networks Inc. is a worldwide leader in content
security appliances and offers products that protect
organizations from threats over email, Web, and IM.
With a strong security heritage, Barracuda Networks offers
networking products that improve application delivery
and network access with SSL VPN, Internet link load
balancing, and server load balancing product lines. Finally,
Barracuda Networks offers world-class solutions for
backup and data protection that include message
archiving, backup software and appliances, and offsite
backup services.
Powerful Products & Technology
Barracuda Networks’ product portfolio includes:
l Barracuda Spam & Virus Firewall
l Barracuda Web Filter, Barracuda Web Application
Firewall
l Barracuda SSL VPN, Barracuda Load Balancer
l Barracuda Link Balancer
l Barracuda Message Archiver
l Barracuda Backup Service
l BarracudaWare software portfolio.
Combining its own award-winning technology with
powerful open source software, Barracuda Networks
solutions deliver easy to use, comprehensive security,
networking, and data protection products. Barracuda
Central, an advanced 24x7 operations center manages
data centers for all service-based offerings and works to
continuously monitor and block the latest Internet
threats.
16
17. Blockmaster provides mandatory password
protection and automatic hardware encryption of
all stored data products:
SafeStick drives are manageable world-wide on
an enterprise scale with the lightweight
SafeConsole® management software offering full
control, remote life-cycle management and device
enhancement such as remote password recovery,
customised password policy, audit for compliance,
portable authentication tokens, productivity tools.
SafeStick SuperSonic is the ultra-fast speed
edition of the proven SafeStick technology.
SuperSonic shares all the proven security features
of the standard edition and is a technological
breakthrough that takes USB speed to the max.
AES256 hardware encryption has never before
pushed the limits like this. This move is designed
to support the huge growth in rich media files,
such as images and videos, being transferred onto
IT SECURITY
USB flash drives for business use.
Safeconsole enforces full USB management
control over an organization’s SafeConsoleReady
secure flash drives. With SafeConsole can enable
specific extended features, configure password
policies, remotely reset passwords, activate audit
for compliance and much more.
17
18. IT SECURITY
Cryptzone
Cryptzone is a technology innovator of proactive controls to mitigate IT security risk. It bring together the
people, processes and technology to mitigate information security risks identified in the four key areas of
Policy Compliance, Content Security, Secure Access and Endpoint Security.
Products & Solutions
Cryptzone develops and sells world-class technical solutions that help to mitigate IT security risk. This
includes NETconsent Policy Compliance, AppGate Access Control, SE46 Application Whitelisting and SEP
encryption and secured endpoint protection based on the Cryptzone Management Console.
Professional Services
Cryptzone Professional Services and support teams work with partners to ensure the success of each IT
security project. Tailor-made packages enable customers to implement cutting edge solutions in a
manner that suits their business needs and meets demands for regulatory compliance.
Technical Support and SaaS
"Follow the sun" support structures enable Cryptzone to provide world-
class support 24 hours a day, 365 days a year. In addition, Cryptzone offers
Security-as-a-Service for organizations that choose to adopt effective and
affordable Cloud Computing services.
Research and Development
Cryptzone listens to its customers and keeps abreast of IT security trends in
order to ensure that its solutions address current IT security issues and the
road map takes into account likely future requirements. Cryptzone
develops its solutions using and integrating with leading technology from
organizations, such as Microsoft®, IBM® and Apple Inc®.
18
19. Entrust provides identity-based security solutions that
empower enterprises, consumers, citizens and Web sites
in more than 4,000 organizations spanning 60 countries.
Entrust's identity-based approach offers the right balance
between affordability, expertise and service. With more
than 125 patents granted and pending, these world-class
solutions include strong authentication, fraud detection,
digital certificates, SSL and PKI.
Entrust helps organizations meet or exceed their security
goals by providing software solutions that:
l protect digital identities through authentication
l protect information assets through encryption
l create layered security environments and promote
efficiency, cost-effectiveness and synergy
Products & technologies
offered by the Entrust:
n Authentication
IT SECURITY
n Digital certificates & PKI
n Fraud Detection
n Email Security
n Data Protection
n Internet Security
n Developer APIs
19
20. IT SECURITY
IPOQUE is the leading European provider of deep packet inspection (DPI) solutions for Internet traffic
management and analysis.
PRX Traffic Manager - Next Generation Internet Traffic Management
Monitor and control network traffic per application and per subscriber
PRX Traffic Manager detects applications with a combination of layer - 7 deep packet inspection (DPI)
and behavioral traffic analysis. All major protocols including peer-to-peer file sharing (P2P), instant
messaging (IM), media streaming and Internet telephony (VoIP) are supported. The integrated quality of
service (QoS) management allows prioritization, shaping and blocking of classified traffic.
PACE (Protocol and Application Classification Engine) is the heart of ipoque´s PRX Traffic Manager.
Regular signature updates guarantee reliable detection of proprietary, obfuscated and encrypted
protocols.
Application Scenarios
PRX Traffic Manager provides wireline
providers, universities and mobile operators
comprehensive and detailed insight into the
network´s per-application and per-user traffic
based on the latest deep packet inspection
technology. This information can be used to
define bandwidth management rules to
prioritize, shape, block and log traffic of
individual applications either in total or for
individual users or user groups.
IPOQUE technologies:
l Bandwidth management
l Quality of Service
l Copyright protection
20
21. LANDesk Software provides systems
management, security management, service
management, asset management, and process
management solutions to organizations.
Thousands of customers worldwide actively use
LANDesk solutions for systems lifecycle
management, endpoint security management,
and IT service management.
LANDesk products are built upon open
Management Automation Platform, and
research firms like Gartner and Forrester
consistently rank LANDesk as an industry leader.
Technologies & Products:
Systems Management Products
l LANDesk Management Suite
l LANDesk Application Virtualization
Endpoint Security Products
IT SECURITY
l LANDesk Cloud Services Appliance
l LANDesk Security Suite
l LANDesk Patch Manager
l LANDesk Patch Manager
l LANDesk Antivirus
l Data Protection
l LANDesk Cloud Services Appliance
IT Service Management Products
l LANDesk Service Desk
l LANDesk Asset Lifecycle Manager
l LANDesk Management Automation Platform
21
22. IT SECURITY
LogLogic provides enterprise-class log management
infrastructure and analysis that turn a customer’s
disparate raw log data into business intelligence.
Loglogic provides compliance (PCI, HIPAA, FISMA, ISO,
ITIL, NERC & SO) and IT data management products
Compliance Products
IT data is scattered across various locations, is difficult
to access, and is hard to make sense of. We can address
all of these concerns with our Get.See.Use. architecture,
prepacked compliance mappings, alerts and reports;
and our unique workflow manager.
IT Data Management Products
LogLogic IT data management delivers reduced time,
cost & hassle of delivering audit quality service, easy
and quick resolution of IT and security incidents,
visibility and control over key infrastructure, in a
package that is simply the most scalable the industry
has ever seen.
22
23. PixAlert is an Irish technology company who have been protecting corporate reputation and
brand integrity of financial, healthcare, pharma and public sector organisations since 1999
through its innovative and advanced portfolio of critical data and image detection and
protection software solutions.
PixAlert deploy world-class scalable information audit solutions, tailored to suit specific client requirements.
We work closely with our clients to understand their business challenges and provide the optimum
information content security solution. The company currently has a client base of over 200 companies
covering EMEA, AsiaPAC and the US territories.
PixAlert is based in Dublin, Ireland and has sales offices in the UK, US, Australia and New Zealand.
IT SECURITY
Products & technologies:
l Critical Data Auditor
l Image Auditor
l ImageGuard MailAppliance
l DataGuard MailAppliance
l Monitor application
PixAlert saves organisations time and energy while
significantly reducing costs by supplying best practice
customised security solutions which comply with legislation,
enforce corporate policies, enhance the working environment,
improve operational efficiency, protect against civil or criminal
proceedings and brand damage.
23
24. IT SECURITY
Rapid7 is the leading provider of security
risk intelligence solutions.
Rapid7 has broken new ground as an
industry pioneer within the security
market for years, providing the industry's
first solution that truly unifies network
security, web application security and
database security into a single framework.
Rapid7’s security risk intelligence solutions
include the integrated vulnerability
management and penetration testing
products NeXpose® and Metasploit®,
Products and technologies:
which empower organizations to obtain
l Vulnerability Management
accurate, actionable and contextual
intelligence into their threat and risk
Identifying vulnerabilities across networks,
posture.
operating systems, databases, Web
applications and a wide-range of system
platforms through an integrated, intelligent
scan engine, Rapid7 NeXpose prioritizes
vulnerabilities using exploit risk scoring and
asset criticality ratings
l Penetration Testing
Metasploit helps enterprise defenders
prevent data breaches by efficiently
prioritizing vulnerabilities, verifying controls
and mitigation, and conducting broad-
scope, collaborative, in-depth penetration
tests.
24
25. SonicWALL, a private company headquartered in San Jose,
CA. offers comprehensive network security, secure remote
access, Web and e-mail security, backup and recovery, and
policy and management solutions.
SonicWALL is a recognised global leader in the small and
medium business markets and its solutions are deployed in
distributed enterprise environments, government, retail
point-of-sale and healthcare segments as well as through
service providers.
Technologies & Product lines:
l SonicWALL Anti-Spam
l SonicWALL® E-Class represents a new generation of
Desktop delivers client-based
comprehensive solutions for Network Security, Secure
anti-spam, anti-phishing
Remote Access, Email Security and Policy and Management.
protection for Outlook,
Outlook Express or Windows
l SonicWALL Next-Generation Firewalls scan every byte of
Mail e-mail clients on
every packet for the deepest level of protection and can
Windows-based desktops or
also be deployed as Unified Threat Management (UTM)
laptops.
firewalls that offer comprehensive security combining
gateway content filtering, anti-spam, anti-virus, anti-
l SonicWALL® Continuous
spyware, intrusion prevention, and application intelligence
Data Protection (CDP) 6.0 with
and control
support for Windows®, Linux®
IT SECURITY
and Mac OS® through a single
l SonicWALL Anti-Virus & Anti-Spyware solutions
Web GUI is a next-generation
automatically deliver updated security definitions
data backup and disaster
immediately to the endpoint as soon as they become
recovery solution that
available, protecting against today’s rapidly-evolving
automatically preserves and
threats.
protects business-relevant
data assets against loss from
file, device, and location based
disasters.
25
26. IT SECURITY
WatchGuard builds affordable, l The WatchGuard SSL families are affordable, easy-to-use,
all-in-one network and content secure remote access solutions providing reliable client
security solutions to provide and clientless connectivity to corporate data and
defense in depth for corporate resources, such as email, file shares and CRM.
content, networks and the
businesses they power: l WatchGuard® 3G Extend wireless bridge makes cellular
connectivity easy and affordable through any
l WatchGuard's award-winning WatchGuard XTM 2 Series or Firebox X Edge e-Series
Extensible Threat appliance – new or installed. It brings the Internet
Management (XTM) network anywhere you need it, including remote areas and
security solutions combine temporary work sites, without the need for cables
firewall, VPN, and security
services to protect networks Since founding in 1996, more than 600,000 WatchGuard
from spam, viruses, malware, signature red security appliances have been deployed
and intrusions. worldwide.
l The new Extensible Content Watchguard technologies:
Security (XCS) appliances
offer content security across n FIREWALL
email and web combined n VPN
with data loss prevention for n ANTIVIRUS
complete content protection. n ANTISPAM
n WEB CONTENT FILTERING
n IPS
n CALL SETUP VOIP SECURITY
n RED – REPUTATION ENABLED DEFENCE
n APPLICATION CONTROL
26
27. Webroot is a leading provider of
Internet security for consumers and
businesses worldwide.
Consistently rated among the best
home and enterprise internet
security offerings available, l Email Archiving Service in the cloud
Webroot’s products include email,
web and archiving internet security Accelerate e-discovery and meet industry and regulatory
services for businesses, and compliancerequirements.
antimalware, privacy and identity Includes: Data Loss Prevention with unlimited data storage in
protection for consumers. the cloud.
l Endpoint Security Software on the desktop
Products & Services
Quickly remove infections and block new malware.Ideal as an
A multi-layered defense is best
extra layer of protection alongside cloud-based security
protection against today's quickly
evolving threats.
IT SECURITY
Webroot offer security in the cloud l AntiSpyware with AntiVirus Corporate Edition
and on the desktop:
Reduce cost & simplify management with
l Web Security Service in the cloud complete corporate malware protection in a
single, easy-to-use solution. This means fewer
Stop web-based threats, filter web installations and updates, one support team and
traffic, and enforce acceptable use better overall system performance.
policy
for corporate and mobile users.
l Email Security Service in the cloud
Protect company data and meet
compliance standards by filtering
emailin the cloud.
27
28. IT SECURITY
While designing and developing the firewall
over several years and many releases, the
team witnessed the scaling down of firewall
technologies.
While the perimeter defense is intact, and
the market for firewalls has matured, the
technology has failed to many critical
security issues. It is in this area which
Copperfasten has focused its energies,
specifically, the need to secure the
enterprise not just from the packets
themselves but also from the content of
these packets.
Technology & products
Copperfasten develops leading edge
Internet Security products for international
markets.
WebTitan is a complete internet monitoring
software (web filter) which provides
organisations protection for their data from
malware and other internet threats such as
viruses, spyware and phishing as well as
providing user policy browsing tools to
ensure corporate internet policy is adhered
to.
Copperfasten was founded in January 2000 by the
WebTitan is available in two versions,
original design team of the highly successful Alta
WebTitan ISO and WebTitan for VMware®,
Vista Firewall at Digital Equipment Corporation.
both of which can be downloaded and
Following the acquisition by Compaq and
installed for free.
subsequent sale of the Alta Vista firewall to Raptor
and then Symantec, the Galway based
SpamTitan is a complete software solution
development team decided that it would pursue
to email security offering protection from
its own interests and formed Copperfasten
Spam, Viruses, Trojans, Phishing and
Technologies.
unwanted content.
SpamTitan is available in three flavours,
SpamTitan ISO, SpamTitan for VMware® and
SpamTitan On Demand, all of which can be
set up and configured for free.
28
29. GY
N OLO
TECH
DO
WITH RNA
IP TO
SH
ER
TN
AR
EP
TH
OF
TS
FI
l ACCESS TO DEMO KITS
NE
BE
(EQUIPMENTS AND
APPLICATIONS) FOR
DEMONSTRATION PURPOSES
l TECHNICAL SUPPORT
l PRE-SALES SUPPORT
l SPECIAL PRICING ALLOWANCE
FOR REGISTERED PARTNERS
l JOINT MARKETING ACTIVITIES FOR PARTNER EVENTS
l MARKETING BACK END REBATE AND COLLATERALS
l CERTIFICATION COURSES IN TECHNOLOGY CENTER
l SALES LEAD GENERATION
l NEWSLETTERS AND WEBCAST INVITATIONS
PARTNERSHIP
l SALES TOOLS,
PRESENTATIONS AND
INCENTIVES
l COMMERCIAL SUPPORT
ON PROJECTS
l ACCOUNT PROTECTION
l SUPPORT MATERIAL
29
30. B2B PLATFORM
30 B2B
Simple and efficient with eServices of the eTornado platform
Tornado Technology provides high quality services for partners, intend to
ease and improve the daily business activities and to keep our promise to
improve the success of partners’ business.
31. eOrders
Secure access to the detailed information in
real time:
l Product information
lPersonalized list price
lStock availability;
currency;
lOn-line orders on a secure platform for
lAutomatic information on the e-mail of
direct delivery or for reservation;
the credit balance and the credit limit.
lAutomatic confirmation on e-mail of the
orders;
lTracking of the on-line orders;
eReport
lCustomized report of the partner business
lEasy management of more orders opened
with Tornado : on product, on brands,
simultaneously (multibasket).
lTracking of the products shipped either in
custody or invoiced;
eMarketing
lOn-line exclusive promotions;
eNotification
lEasy access to the products in promotions, lSending on-line the notifications via e-
selling of the stock or products which had mail to a listed e-mail address ;
their price gone down; lThe option to select a destination
lRecommandations of alternative products addresses of the notification different
available in stock, products in promotions; from that of the parcels shipped.
lMultiple communications by e-mail.
eInvoice
eRMA lAutomatic sending copies of the invoice
lTracking of the service events; via e-mail;
lInformation of serial number of the lThe option to selct a destination addresses
B2B PLATFORM
products; of the invoice different from that of the
lDetails of the purchased products; products of the notification;
lOn-line placing of service events on the lThe option to print the invoice copy
directly from the platform.
platform
eDeliveries
eAlert lSelection of delivery addresses for
lAlert setting on price or stock; different products, invoices and transport
lAutomatic confirmation via e-mail for notice;
stock availability of selected products; lSelection directly from the platform of the
eFinancial forwarder and the automatic calculation
lAccess to the financial data: payment of the transport costs;
terms, credit limit, current credit; lTracking the parcels
lAccess to the balance of payments and (track&trace).
31