Posted by: RAH Infotech | February 8, 2017

F-Secure Wins AV-TEST Best Protection Award for Fifth Time

The award reaffirms that companies who choose F-Secure’s new version of Business Suite will have proven best protection.


F-Secure has won the Best Protection award from the AV-TEST Institute for superior protection technology throughout 2016. The win makes F-Secure a five-time winner of the award, and it’s the only company in the history of AV-TEST to achieve such a distinction.

The AV-TEST Best Protection award is based on a total of monthly tests throughout the year. The AV-TEST institute, a leading international and independent service provider in IT security and anti-virus research, gives the award to the best product of the year for Windows protection. Products are tested on how well they protect against current threats as well as malware infections caused by zero-day attacks from malicious websites and emails. F-Secure’s consistent top scores throughout the year earned the company the top position for the year.

With humans as the weakest link in a company’s cyber security posture, reliable endpoint protection is critical to protecting organizations from attack. A malicious email attachment or a visit to a compromised website can compromise a company network. Preventing the infection from happening in the first place stops attackers before they can gain a foothold inside the network.

“To pass every certification test in 2016 with nearly 100% protection is an excellent achievement,” said Maik Morgenstern, CTO of AV-TEST. “We are rewarding this achievement with the Best Protection 2016 award. With its reliable detection and protection performance, Client Security belongs to the top group of corporate security products.”

“Best protection is about consistency,” said Jyrki Rosenberg, Executive Vice President of Corporate Cyber Security at F-Secure. “As a five-time winner of this award, F-Secure offers consistently better security than any other company in the industry. Our track record is unmatched by any other product. And with our new version of Business Suite, companies of all sizes with demanding security requirements will be able to take advantage of that.”

New Business Suite offers proven best protection

The award is based on F-Secure Client Security, which relies on F-Secure’s proven layered protection technology to guard corporate endpoints against both common malware and brand new threats. Client Security is a component of F-Secure Business Suite, a complete on-site security solution that’s designed to protect the whole IT environment from gateway to endpoints. A new version of Business Suite has just been launched, and it’s retooled for improved scalability, control and visibility of a company’s whole security infrastructure.

The newest Business Suite includes scalability improvements such as MySQL database support and the addition of F-Secure Proxy, which distributes signature and third party software updates to dedicated proxy servers, reducing network traffic. Among other enhancements, an updated management console improves and enhances admin control.

Business Suite covers Windows, Linux and Mac workstations and laptops, as well as file, print, email and collaboration servers, with full support for both physical and virtual endpoints. It includes features like Botnet Blocker, to repel botnets and ransomware; Software Updater, to easily keep applications up-to-date; and Virtual Security, which lets admins offload scanning to improve performance.

“Business Suite is the solution of choice for companies who are looking for a scalable and powerful onsite solution, and who want to be in full control of their IT security infrastructure,” said Rosenberg. “F-Secure Business Suite offers companies all that, as well as officially the Best Protection.”

is an independent supplier of services in the fields of IT Security and Antivirus Research, focusing on the detection and analysis of the latest malicious software and its use in comprehensive comparative testing of security products.


RAH Infotech received the Best Value Added Distributor – APAC 2016 from F-Secure at the recently concluded F-Secure Channel meet at Chennai. The mega event witnessed participation from over 200 partners representing over 120 channel organisations across India. This residential channel meet was held at Hyatt in central Chennai on 18th January 2017.

The event was presided over by Mr. Samu Konttinen, President and CEO, F-Secure Corporation along with Jaakko Hyttinen, VP Global Corporate Sales, Jimmy Ruokolainen, Vice President, Product Management and Rune Kristensen, Director, Radar Services. F-Secure used this platform to also launch their new product and to introduce new partner programs.

RAH Infotech was recognised for fuelling F-Secure’s growth in India and for being the best in the whole of APAC region. Speaking on the occasion, Mr. Ashok Kumar, CEO & MD, RAH Infotech said “We are delighted to be recognised at an APAC level and this award means a lot to us. Over the last couple of years we have really worked hard and I credit this award to my team’s effort. I take this opportunity to thank F-Secure for their continued support.”



Mr. Suchit Karnik addressing the audience


RAH Infotech, a value added technology distributor in India, continued its expansion spree with the launch of its Nepal operations. The company announced its arrival into Nepal market by conducting the first Channel Fest in association with its OEMs Radware, Exinda and WinMagic.

In this gala event held at Hotel Yak & Yeti, over 55 IT personals from 25 different partner companies took part, making the event a grand success. Mr. Sabin Upadhyaya, Country Manager, Nepal for RAH Infotech delivered the welcome speech introducing RAH Infotech and its OEMs to the partners gathered.

Mr. Suchit Karnik, Senior VP, RAH Infotech took the audience on a RAH Infotech journey and explained why RAH Infotech has been the fastest growing value added technology distributor in India for the last three years in a row and what value it can add to partners’ business and how they can benefit from working with RAH Infotech.

Speaking on the occasion Mr. Karnik said “Nepal is an important region for RAH Infotech and hence we are setting up our operations here with a dedicated team to cater to this market. We’ve been the fastest growing VAD in India and with continued support from Nepal channel community, we expect to replicate the success in this market as well,” he added.

Representatives from Radware Mr. Apurva Bhatnagar and Mr. Vandit addressed the gathering about the application delivery and cyber security challenges and opportunities in the market and how Radware can help partners address customer challenges while benefiting from working with Radware.

Mr. Abhishek (RSM, WinMagic) educated the audience on the importance of data security and data theft issues plaguing organisations and how the same can be effectively overcome using WinMagic encryption and data security solutions. Mr. Rahul Kumar, Country Manager, WinMagic announced exciting incentive schemes for the partners while explaining how WinMagic solutions can address customers’ data security concerns.

Posted by: RAH Infotech | December 9, 2016

To Pay or Not to Pay: Ransom-Based Threats on the Rise


A contributory article by Mr. Nikhil Taneja, Managing Director – India & SAARC, Radware

Even though C-suite executives are unlikely to have full visibility to every security threat, one in seven respondents in the 2016 Executive Application & Network Security Survey reported that they experienced a ransom attack in the past year. More than half (54%) admitted to paying a ransom.

Across industries and geographies, the propensity to send funds could reflect a strong desire to make the threat “go away” by simply giving in to the demands. That action may have the unintended—and undesirable—consequence of inviting continued ransom threats. If word gets out on the “dark web” that a company paid, it can expect to receive additional threats from the same or different attackers. After all, negotiating with criminals can become a proverbial slippery slope.

Businesses facing growing threats from ransom-based attacks could be categorized into two primary “flavors”:

  • Ransomware – in which attackers typically use malware to encrypt critical data, making it unusable until the user complies with instructions to make a payment via Bitcoin. One of the latest varieties to emerge is Ransom32, which is ransomware as-a-service that gives cyber criminals a jumpstart on holding victims’ information hostage.
  • DDoS for ransom – in which attackers send their target a letter that threatens a DDoS attack at a certain day and time unless the organization makes a payment (usually $2,000 to $10,000) via Bitcoin. Often hackers will launch a small-scale attack as a preview of what could follow.

Previous Radware research revealed an increase in ransom-oriented attacks, which accounted for about one-quarter of motivations in 2015 (versus 16% in the prior year). In the full-length 2015-2016 Global Application & Network Security Report, Radware predicted that ransomware and DDoS for ransom schemes would continue to affect everything from traditional enterprises to cloud companies. The findings of the most recent Executive Survey underscore the validity of that prediction.

November 2015, the Swiss-based encrypted email provider experienced consecutive attacks initiated with a ransom request by hacker group The Armada Collective. Hoping to stop the attacks, ProtonMail paid  ransom, only to see the attacks continue with volumetric and burst attacks combining application and network vectors.

The Kansas Heart Hospital in Wichita learned a similar lesson in May 2016. Having fallen prey to ransomware, the hospital paid the ransom to get its files back. Instead, it received only “partial access,” along with a demand for more funds. The hospital declined the second request. Its experiences were the latest in a string of ransomware attacks targeting hospitals and health systems across the U.S.

How can you detect a fake ransom letter?

The Armada Collective normally requests 20 Bitcoin (approx. $6,000 US Dollars at the peak of the attacks), while other campaigns have been asking for amounts above and below this amount. Fake hackers request different amounts of money. Low Bitcoin ransom letters are most likely from fake groups who are hoping their price point is low enough for someone to pay rather than seek help from professionals.

Check Your Network

Real hackers prove their competence by running a small attack while delivering a ransom note. If you can see a change in your network activity, the letter and the threat are probably genuine.

Look for Structure

Real hackers are well organized. Fake hackers, on the other hand, don’t link to a website. Nor do they have official social media accounts.

Consider Other Targets

Real hackers tend to attack many companies in a single sector. Fake hackers are less organized, targeting anyone and everyone in hopes of making a quick profit. Contact peers or information sharing organizations in your industry to see if there is a more widespread campaign underway.

What now?

While it is impossible to predict the next target of a ransom group, organizations need to proactively prepare their networks and have an emergency plan in place for such an incident. If faced with a threat from a blackmail group, it is important to take the proper steps to mitigate the attack. Organizations under attack should consider:

A security solution that can protect an infrastructure from multi-vector attacks, including protection from network and application-based DDoS attacks, as well as volumetric attacks that can saturate the Internet pipe.

A cyber-security emergency response plan that includes an emergency response team and process. Identify areas where help is needed from a third party.

Monitoring security alerts and examining triggers carefully. Tuning existing polices and protection to prevent false positives and allow identification of real threats when they occur.


In a year that saw this organisation crossing many milestones and winning many awards, RAH Infotech wins yet again and this time the ‘Fastest Growing Technology VAD 2016’ award from SME Channels at the recently held SME Channels Achiever’s Award function 2016.

With a consistent 50% growth YoY RAH Infotech has been scaling new heights every fiscal. This is second such award in less than a month with a similar award received from VAR India. All these awards put RAH Infotech clearly ahead of the race and the company aims to take it to next level in the coming years.


On Friday the 18th of November at Le Meridian Delhi, RAH Infotech and Cisco called upon their customers to ready them to transform their organisation with Cisco’s Digital Network Architecture (DNA) and Hyperconverged Infrastructure.

During the session, Mr. Manjeet Singh briefed to customers on how RAH Infotech can add value to its customers’ business and how together with Cisco can help organizations transform their network. Mr. Somil Mathur from Cisco further briefed about the advantages of Cisco’s on-premises and cloud-managed technology and solutions through Digital Network Architecture (DNA) and how customers can unify compute, storage, and networking with HyperFlex to gain competitive edge.

The session was attended by over thirty CIOs, IT Heads and CTOs from more than sixteen organizations. Mr. Srinivasa Vangala, Group CIO, India, SAARC & China of MAT Holdings stole the show with his presentation on ‘Journey towards IT transformation’ by demonstrating to the audience on how his organisation benefited from using Cisco’s solutions and how they managed to gain better control over their network.

He touched upon the key IT issues organizations face today including lack of stable digital infra to support the business, challenges of independent IT operations in each entity of the organization, service delivery, monitoring, accountability, operational and security issues and how his organization overcame each of these challenges with Cisco’s next gen solutions and realizing key benefits like:

  • Improved network up-time and enhanced operational efficiency
  • High Availability and Reduced Cost of Ownership
  • Achieved Uninterrupted Production Support
  • Faster design innovation and time to market
  • True mobility and introduction of global business processes
  • Enterprise Security Enhancement

Post the session, it was down to networking over cocktails where the participants further interacted with RAH Infotech and Cisco teams on how Cisco’s solutions can help their organisations to improve IT efficiency and resilience. An eventful evening came to an end with participants expressing their happiness about the usefulness of the session.


RAH Infotech, a leading value added distributor in India in association with WinMagic, a global leader in Data Security, held channel meet at The Lalit Mumbai on 23rd September 2016. The meet received an overwhelming response with 48 channel partners from 25 organisations gracing the moment despite thunderstorms, heavy rains and militant movements in the city.

The meet was aimed at introducing partners to the latest offerings from WinMagic and also enhancing their knowledge on the existing solutions. Session was kicked off by Mr. Suchit Karnik, Senior Vice President, RAH Infotech with an introductory note where he briefed the partners about the strength, capabilities and solution offerings of RAH Infotech.

Later the dias was handed over to Mr. Rahul Kumar, Country Manager, WinMagic India who appraised partners about the latest encryption solutions from WinMagic and how these solutions can help partners not only offer best of security solutions to their customers but also enhance their bottom-line in a competitive market.

Mr. Raju Veeranna, Senior Presales Engineer from Winmagic India further stressed on the technical aspects of encryption solutions and their key features and benefits. Mr. Gautam Jaiswal, Regional Sales Manager – West, WinMagic India explained about the channel incentive schemes to further encourage partners to adopt WinMagic encryption solutions.

The meet was summed up with a round of networking, cocktails and dinner.

Posted by: RAH Infotech | September 12, 2016

RAH Infotech bags “Outstanding contribution Award” from F-Secure


RAH Infotech, a leading value added distributor in India was awarded “Outstanding contribution Award for 1H 2016” by F-Secure at the recently held F-Secure Channel Partner Meet “Let’s Create Value Together” on 2nd September 2016 at Hotel Lalit, Mumbai.

The channel meet was presided over by Mr.Jaakko Hyttinen, F-Secure Vice President, Global Corporate Sales and Mr. Jimmy Ruokolainen, F-Secure Vice President, Product Management. The meet was attended by over 200 partners from 90 organisations where partners were recognized for their contribution to F-Secure business in India.

This is the second award in a row for RAH Infotech from F-Secure. Earlier this year, RAH Infotech had bagged “Best Execution Partner 2015” from the European cyber security company.

WinMagic, a global leader in encryption management, has entered into a strategic tie-up with RAH Infotech, a leading value added distributor in India. The collaboration is aimed at leveraging the synergies of the two partners to help organizations minimize business risks, meet privacy and regulatory compliance requirements and protect valuable information assets against unauthorized access.

Rahul Kumar, Country Manager, WinMagic India Pvt. Ltd., shared “Within an enterprise, there are a wide variety of systems and processes that make data security complex and challenging. To ensure the success of your IT infrastructure as it grows, it’s critical to host and manage the keys to encryption effectively.”

“RAH Infotech as our distributor will play an instrumental role in enhancing our channel base by helping us reach out to various untapped markets across India. We are confident that the channel strength that RAH Infotech brings and the innovation in technology that WinMagic is known for will work in synergy to our mutual advantage in India. This tie-up would enable us to meet the ever changing demands of customers,” he added further.

Mr Ashok Kumar, Chief Executive Officer at RAH Infotech said, “When companies bring teams into a centralized data security management environment such as WinMagic SecureDoc Enterprise Server (SES), you have better control over who can access and see files on your network. With their powerful application-aware platform, companies will be able to instantly gauge the health of their security keys within a single-pane view, making it faster to administer and execute manual security tasks across any platform.”

“RAH Infotech’s focus is on providing excellence to our partners while successfully introducing and establishing new technology vendors in the market and strengthen existing vendors’ market share. This association with WinMagic will help us reinforce our support to our esteem partners and customers,” further added Ashok.

Posted by: RAH Infotech | September 7, 2016

Radware Positioned as Leader in Gartner Magic Quadrant 2016

Radware’s Seventh Inclusion in the ADC Magic Quadrant for application delivery controllers; Evaluation Based on Completeness of Vision and Ability to Execute.

Radware has been positioned in the Leaders Quadrant for its Application Delivery Controllers in the September, 2016 Magic Quadrant for Application Delivery Controllers (ADC).

“We believe that Radware’s continued recognition in Gartner’s Magic Quadrant for Application Delivery Controllers is proof-positive of our commitment to the ADC category, especially in the face of rapidly changing needs in IT Infrastructure,” said Sharon Trachtman, Chief Marketing Officer for Radware.  “Companies turn to Radware because they require their mission critical business applications to be available and performing optimally at all times. The combination of Radware’s strong architectural approach, the powerful security integrations, and the advanced customization, automation and programmability of Radware’s offerings are what keep our customers up and running.”

Radware’s comprehensive technology portfolio includes a full suite of appliances, software solutions, virtual licensing, cloud and OTT cloud services that ensure businesses see an optimal application service level delivery and receive a fast return on their investment in any network configuration.

Radware’s next generation application delivery controller (ADC) is the only ADC that guarantees application service levels with the ability to assign a fully isolated vADC per application or service. Alteon NG offers high vADC density and has a deep set of integrated security capabilities, including DDoS, SSL inspection, WAF, device/user fingerprinting, and defense messaging capabilities.

Radware’s unified management and orchestration framework for ADC and security technologies provides customers with a full array of models from production level testing/evaluation software versions on up to carrier-grade platforms.

Radware includes application performance monitoring (APM), single sign-on (SSO), web application firewall (WAF), advanced Denial of Service (ADoS), multi-homing/enterprise gateway, and web performance optimization (WPO) capabilities as advanced services within their ADC technology. Radware application delivery architecture supports SDN and NFV environments to meet the evolving data center environment requirements. Radware also integrates with industry-leading infrastructures, including Cisco’s ACI, VMware NSX, OpenStack, Ansible, Chef and Puppet.

The company has also offered for more than half a decade a ‘pay-as-you-grow’ software upgrade model for its platforms, which has extended over the years to other products in its portfolio to ensure customers enjoy the best price-to-performance solutions to meet growing and not stagnant or locked-in bandwidth needs.

Trachtman added, “We are dedicated to delivering the most advanced, agile and powerful solutions in the industry no matter how standard, hybrid or cloud-based an infrastructure may be.”

The description for the leaders quadrant according to Gartner is as follows: “a Leader exhibits the ability to shape the market by introducing capabilities in its product offerings and by raising awareness of the importance of these features. Key capabilities for a Leader in this market revolve around enterprise application functionality. We expect a Leader to have strong or growing market share and to have solutions that resonate with an increasing number of enterprises. We expect Leaders to release ADC capabilities (deployment models, features, pricing models and so on) well in advance of mainstream enterprise demand. A Leader must exhibit expertise in complex enterprise application environments and offer a range of deployment models.”

Older Posts »