Post on 17-Jul-2020
NewChannel – a family of businesses
NewChannel is a 100% channel committedvalue add distributor focussed on
innovative security and management solutions for enterprises, government,
healthcare and other organisations.
NewProfs connects technology to peopleand people to technology. The engineers,
consultants and other experts offer certified knowledge with true hands-on
experience.
NewClouds offers a cloud-basedplatform of MSSP services for
security, organisational management, databackup and other solutions.
About NewChannel B.V.
Founded in 2012
Privately funded / owned / invested
Together 70+ years IT distribution channel experience
Partnerships with external technical engineers/consultants and marketing agents
Smart organisation, reduce costs, leverage internal & external expertise
Focus on sales & marketing and technical expertise and services
Value Add Distribution
Selected portfolio means focus
Direct touch - 100% indirect sales
Strong on partnerships & cooperation (vendor, channel and media)
Adding sales, marketing and pre/post-sales support & services
Focus on EU-based/developed security solutions & EU-compliancy
NewChannel 360because Cyber Security is not static
Cyber Security is an ever ongoingprocess that requiresa continuous focus
NewChannel 360 answers withinnovative solutions and services
From the earliestidentification to resolving andpreventing it ever happens again …
… and again and again.Our solutions, services and
expertise are at your service!
Adding NewChannel marketing & sales services and technical support
NewChannel 360Cyber Security is not static
A complete set of Cyber Security solutions and services to
IDENTIFY Inventory, profile and manage baseline
PROTECT Prevent, patch, limit and manage access
DETECT Discover, hunt and analyze threats
RESPOND React, coordinate, report and learn
RECOVER Realize, roll-back and continue
Note: Model inhouse defined loosely on Gartner ideas.
PRE-EVENT
POST-EVENT
NewChannel 360 - IDENTIFY
Acunetix
Security Assessment, Vulnerability Scan, Pentest
Cyber Observer
CISO Dashboard
F-Secure
RADAR Vulnerability Assessment & Management
Keeper Security
BreachWatch Darkweb Monitoring
Matrix42
Workplace Management
Red Sift
User & domain validation
Trusted-ID
Inventory management
AD-cleaning
NewChannel 360 - PROTECT
Acunetix
Web Application Security assessment & reporting
Clavister
NextGen Firewall, Advanced Threat Protection, Endpoint Protection
Endian
NextGen Firewall, Hotspot security, IoT Industrial Security
F-Secure
Endpoint Protection
Keeper Security
User authentication & reporting
Matrix42
Endpoint Protection, Encryption, DLP, Device Management
Red Sift
Email configuration, verification & reporting
Trusted-ID
Identity & Access Management
NewChannel 360 - DETECT
Acunetix
Security Assessment, Pentest
Clavister
NextGen Firewall, Endpoint Protection,
Endian
NextGen Firewall, IoT Industrial Security
F-Secure
Endpoint Protection, EDR
Keeper Security
BreachWatch Darkweb Monitoring
Matrix42
Endpoint Protection
Red Sift
Detect malicious email source
NewChannel 360 - RESPOND
Clavister
Advanced Threat Protection, SSL/HTTPS-scan, Web Security
Endian
Industrial/IoT communcations data analyzing
F-Secure
Endpoint Protection with EDR
Countercept MDR
Matrix42
Quarantine, block & notify malware scripts
NewChannel 360 - RECOVER
Bacula
Enterprise Backup
Data Recovery & Management
F-Secure
Countercept MDR
DataGuard
Matrix42
Selfhealing desktop
NewChannel 360Value Services
Marketing Services offered to partners
Events & joint lead generation programs
Training & Certification
Pre/Post-Sales Technical Support
Sales Consultancy
In-house expertise
Salestools and Partner Portal
Pricelists, quoting, configurators,
Battlecards
Deal Registration (DR)
Competitive Upgrade Programs (CUP)
Value Added Distribution
the key to a secure Benelux
Value Added Distribution
YOUR key to a secure Benelux
AcunetixWeb Application Vulnerability Scanning
Worldwide marketleader in web application vulnerability scanning
Dedicated and fully automated solutions
The best of dynamic and static scanning technologies
Separate monitoring agent
Extensive reporting
Vulnerability report
Compliancy report
Integration 3rd parties
Azure DevOps, GitHub, Jenkins…
Onprem or Cloud implementation
AcunetixWeb Application Vulnerability Scanning
Regular fully automated scanning
Identify and report risks and vulnerabilities before others do…
Web Vulnerability Scanning, Penetration testing
Cross-site scripting, SQL-Injection, XML-attacks, TLS/SSL-hardening, etc.
Blackbox & greybox
Website Security Scanner
HTML5, Javascript, Java-frameworks, ASP.NET, php
Wordpress, Joomla, Drupal and other cms
Network & Enterprise Security Check
Find, Fix & Prevent
Automated retesting
Bacula SystemsEnterprise Backup & Disaster Recovery
One Enterprise BDR Solution for backing up and restoring:
All available data stored on any server or storage device
Any physical or virtual server including BMR on Windows and Linux,
All major databases and less well-known databases
Modular solution; only buy the features you need
No hidden costs, low TCO
Use the interface you want:
CLI, webbased GUI, BAT, Rest API
Onprem or cloudbased
Strong open-source background
First-class technical support
EU-developed & based
Bacula SystemsEnterprise Backup & Disaster Recovery
All major databases and less well-known databases
PostgreSQL, MySQL Percona, MS SQL, MS Exchange & AD
Oracle, SAP, SAP HANA, SAP (Sybase)
Any physical or virtual server including BMR on Windows and Linux,
Windows Server 2008, 2012, 2016 and 2019,
VMware, Hyper-V, KVM, Swift Object Storage, Containers: Docker
RHV, Proxmox, XEN, Kubernetes Clusters
Cloud connectivity
S3/S3-IA, AWS, Azure, Google Cloud, Oracle Cloud
Endpoint data de-duplication
VerifyData silent data corruption detection
Single mailbox restore, extremely fast recovery
FIPS 140-2 compliant
ClavisterSecurity by Sweden #NoBackdoors
More than 20 years of IT Security Expertise
Clavister Aurora Security Framework
Identity & Access Management (IAM)
Device Security
Network Security
Cloud Services
No open-source Core OS
In-house development
Leading 3rd party support
EU-based & developed
100% #NoBackdoors Guaranteed
ClavisterSecurity by Sweden #NoBackdoors
Identity & Access Management
EasyAccess & EasyPassword
Device Security
Endpoint Client & OneConnect
Network Security
NetWall - nextgen firewall
NetShield – services based firewall
NetEye - advanced threat protection
Management & Cloud Services
InCenter & InControl
MSSP solutions available
Cyber ObserverFrom cyber security chaos to order
Holistic Cyber Security Management
One central dashboard Clear & complete overview
Extended reports and statistics
Developed for IT management CISO
IT Department Management
Risk & Compliancy Management
Collects, centralizes & combines cyber security status into one unique tool Connects to unlimited no. of Critical Security Controls (CSC)
Includes actionable alerts & reports
Compliant to industry-standard frameworks (ISO, NIST, PCI-DSS, GDPR, etc.)
Cyber ObserverFrom cyber security chaos to order
Maximum visibility on full IT ecosystem
Near-realtime score-based interface
Seamless IT vendor solution integration
Unlimited version library with 1.000’s of CSC’s
More than 150 supported tools/vendors:
Cisco, Sophos, Fortinet, McAfee, Palo Alto…
VMware, NetApp, Microsoft, Citrix, IBM…
Tenable, Qualys, Rapid7, Splunk…
Automatic reporting & alerting
Endian – Secure everyThingSecure Digital Platform for IoT and Industry 4.0
Secure connectivity
Ethernet, WiFi, 3G/4G, serial
Remote access, segmentation, AAA, encryption
UTM firewall, IPS, failover, industry specs
Monitor
Data collection (S7, ModBus, SCADA, OPCUA)
Alerting and reporting
Analyze
Dashboards & data visualisation
Custom apps/codes
EU-based & developed
Endian – Secure everyThingThe simplest and most secure UTM and Hotspot
Small to large networks
Full high-performance UTM featureset
Application control
Mail/websecurity
Secure remote access
Live monitoring & reporting
Appliance, virtual or software based
Central cloudbased management platform
Multi-tenant, MSP/MSSP
Extensive WiFi/Hotspot and BYOD features
EU-developed & based
F-Secureleading cyber security from Finland
Leading innovative cybersecurity technology
Award winning
More than 30 years security experience
Hollistic Cyber Security approach
Predict
Prevent
Detect & Respond
Full range of solutions
Mobile, desktop, server, onprem, cloud
Supported by all Dutch ISP’s
MSP supported
F-Secureleading cyber security from Finland
Protection Suite for Business (PSB)
Full Endpoint Protection suite
Integrated patch-management
Partner / Customer cloud-managed
Mobile, desktop, server protection
Windows, Mac, Linux, Android, iOS
Rapid Detection & Response (EDR)
RADAR Vulnerability Management
Cloud Protection for SalesForce
Countercept Managed Detection & Response (MDR)
EU developed & managed
Keeper SecurityEnterprise Password Management
Prevent cyberthreats due to leaked/weak passwords
Full data encryption
Encrypted vaults
Encrypted synchronisation
Strong password policy enforcement
Multi-platform
Alerting and detailed reporting
Darkweb monitoring
Cloud-based, local vault synchronisation
Comply to regulations and laws
GDPR/AVG, FINRA, DPA, HIPAA
Keeper SecurityEnterprise Password Management
Enterprise grade security & features
AD/LDAP-integration, SAML 2.0, SCIM and Azure AD
Single Sign-On (SSO) integration
Azure, ADF, Okta, G Suite
Role Based Access Control (RBAC) & teams
2FA support
DUO, Yubikey, RSA
Secure data sharing
Secure Chat functionality
MSP available
Matrix42 EgoSecureiCAFE Endpoint Protection
Hollistic approach to endpoint protection
Prevents from known ánd unknown threats
Complete solutions suite against external ánd insider threats
EgoSecure iCafe
Intellact – detects anomalies, automated responses
Control – device management, access control
Audit – detailed reporting
Filter –analyze, monitor & filter, dlp, antimalware
Encrypt – storage, cloud, communications, pre-boot
Cloud-based management
EU developed & managed
Matrix42 EgoSecureiCAFE Endpoint Protection
Intellact
Insight Analysis & Automated Actions
Inventory, Secure Erase
Green IT
Password Manager
Control
Device Management
Cloud & Connection Access Control
Audit
Security Audits
Filter
Content analysis & filter
Antivirus
App Control & DLP
Encrypt
Removable media, full disk, local folder, pre-boot
Cloud storage, network share
Permanent Encryption
iOS, Android, email
Red Sift - OnDMARCSecure e-mail starts at the beginning
Cloud-based email security solution
Secures from spoofing and phishing
Quick & easy to configure and maintain
SPF (Sender Policy Framework)
Dynamic SPF added functionality
DKIM (DomainKeys Identified Mail)
DMARC (Domain-based Message Authentication, Reporting and Conformance)
Reduces email traffic
Block malicious messages
Validate email sources
Increases email deliverability
Domain/sender verification
Extensive reporting, alerting & analyses
Red Sift - OnINBOXSecure email starts at the beginning
Advanced email threat protection
Full integration Microsoft 365 and Google G Suite
All platforms: desktop, mobile, webmail
Identifies email security threats
Three risk indicators in each received email
Authentication – check on SPF, DKIM & DMARC
Content – unwanted content & blacklist check
Trust – build your own trusted network
added ‘ Learn more’ button
Adds to email security gateways
Educates email users & security awareness
A
C
T
Swivel SecureIntelligent Multi-Factor Authentication
Multiple authentication methods
Risk-Based Authentication (RBA)
Dynamic intelligent authentication
Authentication policy based
Single Sign-On (SSO)
AD/LDAP-synchronisation
Onprem / private cloud implementation
Swivel Cloud implementation
Private IP-address with private firewall
Dedicated solution
Integrates with 100’s of applications
Swivel SecureIntelligent Multi-Factor Authentication
Many authentication methods as standard
PINsafe (patented PINpad, PICpad, TURing)
Mobile app (OTC, PUSH, Oauth)
Mobile SMS
Biometrics
Hardware token (OTC)
User self-service portal
Change/reset PIN
Provisioning, synchronisation
3rd party integrations
RADIUS, ADFS, SAML, AgentXML (API)
Trusted-IDIdentity & Access Management
Make Identity & Access Management accessible, reliable and safe
Enhanced manageability
Interconnects the most important business systems with IDM
Public, private or hybrid cloud options
Comply to legal and governmental rules
Flexible user self-service portals
Trusted-IDIdentity & Access Management
Why focus on EU cyber security solutions?
Comply to EU-regulations Required by many (local) governments
General Data Protection Regulation (GDPR)
Data must always be kept Secure
Private
Protected against unauthorised access
Major end-customers preference Confidential data remains in EU
EU-based/owned/regulated datacenters
Not vulnerable to non-EU regulations
Right to be forgotten
#NoBackdoors
Why focus on EU cyber security solutions?