Posted by: RAH Infotech | September 7, 2016

Radware Positioned as Leader in Gartner Magic Quadrant 2016

Radware’s Seventh Inclusion in the ADC Magic Quadrant for application delivery controllers; Evaluation Based on Completeness of Vision and Ability to Execute.

Radware has been positioned in the Leaders Quadrant for its Application Delivery Controllers in the September, 2016 Magic Quadrant for Application Delivery Controllers (ADC).

“We believe that Radware’s continued recognition in Gartner’s Magic Quadrant for Application Delivery Controllers is proof-positive of our commitment to the ADC category, especially in the face of rapidly changing needs in IT Infrastructure,” said Sharon Trachtman, Chief Marketing Officer for Radware.  “Companies turn to Radware because they require their mission critical business applications to be available and performing optimally at all times. The combination of Radware’s strong architectural approach, the powerful security integrations, and the advanced customization, automation and programmability of Radware’s offerings are what keep our customers up and running.”

Radware’s comprehensive technology portfolio includes a full suite of appliances, software solutions, virtual licensing, cloud and OTT cloud services that ensure businesses see an optimal application service level delivery and receive a fast return on their investment in any network configuration.

Radware’s next generation application delivery controller (ADC) is the only ADC that guarantees application service levels with the ability to assign a fully isolated vADC per application or service. Alteon NG offers high vADC density and has a deep set of integrated security capabilities, including DDoS, SSL inspection, WAF, device/user fingerprinting, and defense messaging capabilities.

Radware’s unified management and orchestration framework for ADC and security technologies provides customers with a full array of models from production level testing/evaluation software versions on up to carrier-grade platforms.

Radware includes application performance monitoring (APM), single sign-on (SSO), web application firewall (WAF), advanced Denial of Service (ADoS), multi-homing/enterprise gateway, and web performance optimization (WPO) capabilities as advanced services within their ADC technology. Radware application delivery architecture supports SDN and NFV environments to meet the evolving data center environment requirements. Radware also integrates with industry-leading infrastructures, including Cisco’s ACI, VMware NSX, OpenStack, Ansible, Chef and Puppet.

The company has also offered for more than half a decade a ‘pay-as-you-grow’ software upgrade model for its platforms, which has extended over the years to other products in its portfolio to ensure customers enjoy the best price-to-performance solutions to meet growing and not stagnant or locked-in bandwidth needs.

Trachtman added, “We are dedicated to delivering the most advanced, agile and powerful solutions in the industry no matter how standard, hybrid or cloud-based an infrastructure may be.”

The description for the leaders quadrant according to Gartner is as follows: “a Leader exhibits the ability to shape the market by introducing capabilities in its product offerings and by raising awareness of the importance of these features. Key capabilities for a Leader in this market revolve around enterprise application functionality. We expect a Leader to have strong or growing market share and to have solutions that resonate with an increasing number of enterprises. We expect Leaders to release ADC capabilities (deployment models, features, pricing models and so on) well in advance of mainstream enterprise demand. A Leader must exhibit expertise in complex enterprise application environments and offer a range of deployment models.”

RAH Infotech recently added another feature in its cap of strong business partners. The company has tied up with Data Resolve, an emerging player in the area of Cyber Security and Intelligence for Enterprises.

Dhruv Khanna, CEO & Director, Data Resolve Technologies shared “ We are focused on addressing issues related to corporate fraud, data leak and employee productivity with security analytics via end points, from in-premise and on-cloud platforms, with products christened as “inDefend – Solution for Insider Threat Management for Desktop and Laptops” and “MobSec – Solution for Mobile Workforce Management for Smart Devices”.

“We are excited to take our business to newer heights with this association with RAH Infotech. They clearly are leaders in value added distribution and solutions provider in the Network and Security domain”, added Mr. Khanna.

The constant barrage of cyber-attacks and threats has created a need to prevent data leak attempts from inside and outside the organization. Although many solutions are available in the market today that focus on preventing data leakage but they fail to launch attempts to inhibit internal digital impendence before it consumes the entire organizations’ resource.

Mr Ashok Kumar, chief executive officer at RAH Infotech said, “Data Resolve Technologies is in the prime business of providing detailed real-time information on data leakage reducing the business risks and protecting data from insider threats throughout its lifecycle. The core concept behind their technology is to help organizations detect human behaviour well before incidents occur including time spent by end users in productive and unproductive work, sensitive online searches and chats among the peers. We are delighted to be associated with Data Resolve and are looking forward taking their solutions to our customers” he added.


Radware 2016 Executive Application & Network Security Survey Also Finds Telecommuting, Internet of Things, and Wearables Are Among Rising Security Concerns.

How many businesses will pay a ransom if attacked? It might depend on if they have already been a victim of ransomware. Some 84 percent of U.S. and U.K. information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 percent paid, according to Radware’s 2016 Executive Application & Network Security Survey.

Radware, a leading provider of cybersecurity and application delivery solutions ensuring optimal service level for applications in virtual, cloud, and software-defined data centers, polled more than 200 IT executives across the U.S. and U.K. The study found that U.S. companies were far more willing to admit that they would pay a ransom. Among U.S. firms who had not been attacked, 23 percent indicated they were prepared to pay a ransom, in contrast to the 9 percent in the U.K.

Companies that paid ransoms reported an average of $7,500 in the U.S. and £22,000 in the U.K.

“This is a harbinger of the challenging decisions IT executives will face in the security arena,” said Carl Herberger, Radware’s Vice President of Security Solutions. “It’s easy to say you won’t pay a ransom until your system is actually locked down and inaccessible. Organizations that take proactive security measures, however, reduce the chance that they’ll have to make that choice.”

In addition to the responses to ransom attacks, Radware’s 2016 Executive Application & Network Security Survey found which security threats most weigh on the minds of the C-suite and senior executives.

Former hackers are seen as reliable watchdogs: Senior executives see former bad guys as the best way to test their systems. Some 59 percent of respondents said they either had hired ex-hackers to help with security or were willing to do so, with one respondent saying, “Nothing beats a poacher turned gamekeeper.”

Firms see telecommuting as security risk: Work-from-home arrangements are seen as an increasing risk. The survey found a big jump in changes to telecommuting policies, with 41 percent of respondents saying they have tightened work-from-home security policies in the last two years.

Wearables require more than a dress code: While about one in three companies implemented security policies around wearables in the last two years, 41 percent said they still have no rules in place, leaving a growing number of end points potentially vulnerable. Perhaps this is because wearables aren’t seen as a major target—only 18 percent pointed to wearables when asked what hackers would most likely go after in the next three to five years.

New connected devices will be the next security frontier: While wearables were less of a concern, many executives surveyed think the Internet of Things (IoT) could become a bona fide security problem. Some 29 percent said IoT devices were extremely likely to be top avenues for attacks, similar to the percentage of nods received for network infrastructure, which received 31 percent.

Cleaning up after a cyberattack can be expensive: More than a third of respondents in the U.S. said an attack had cost them more than $1 million, and 5 percent said they spent more than $10 million. Costs in the U.K. were generally lower, with 63 percent saying an attack had cost less than £351,245 or about $500,000, though 6 percent claimed costs above £7 million.

Security risk is business risk: Whether motivated by ransomware or another factor, attacks impose significant reputational and operational costs on victims. When executives named the top two risks they face from cyberattacks, brand reputation loss led the pack, with 34 percent of respondents choosing that as a big fear. Operational loss (31 percent), revenue loss (30 percent), productivity loss (24 percent), and share price value (18 percent) were also included in the top concerns.


On behalf of Radware, Merrill Research surveyed 205 IT executives (104 in the U.S. and 101 in the U.K.) in April and May 2016. To participate in the 2016 Executive Application & Network Security respondents were required to be at a company with at least $50 million (or equivalent) in revenue and hold a title of senior vice president level or higher. By design, the survey’s respondents were equally split between C-level executives and senior vice presidents. About half of the companies in the survey have 1,000 to 9,999 employees, averaging about 3,800.


Posted by: RAH Infotech | June 28, 2016

Next-Gen NAC: A Game Changer in Network Security Solutions

Authored By Ashok Kumar, MD & CEO, RAH Infotech Pvt. Ltd.
NAC’s incarnation, next-gen NAC, offers tremendous value and advantages that can be applied across a variety of security requirements, policies, and controls

Not a day passes without the news of a major data breach. Although enterprises are spending billions on network defences, they are constantly being subjected to attacks that seem to confound all. According to the 2015 Cyber Threat Defense Report, more than 71% of respondents’ networks were breached and nearly 60% have reported an increase in mobile threats.

Cyber threats are constantly evolving and becoming more sophisticated than ever. The attackers are organized, skilled, and highly motivated. They know that it’s easier to compromise vulnerable endpoints than to directly target servers and databases. On their part, companies too make their vulnerabilities evident when they fall behind in undertaking patching efforts, have inactive host defences, and lack BYOD controls. They find it difficult to secure their weakest links: mobile phones, social media, and laptops and tablets. With most of the users having active social accounts on their mobiles and tablets, attackers indulge in tactics such as spear phishing and waterholing to trick unsuspecting users into sharing access credentials or downloading malware-infected files. Once the users have fallen to the ruse, it takes only a moment for hackers to breach the security and exploit other less secure systems.

The Second Coming of a New, Powerful NAC


Network access control (NAC) has always been the talk of IT security professionals for well over a decade since it first made its appearance. NAC is a network security solution designed to grant, limit, or deny access to network resources through policies defining acceptable or unacceptable users, devices, and application properties. It provided them with a means to limit access to healthy devices. But device authentication came at a cost: it was cumbersome, costly to implement, and often disrupting users. As organizations begin to tolerate wireless, mobile devices and institute bring-your-own-device (BYOD) polices, the chorus grew for a new, powerful network defense system: the next-gen NAC. The need was very specific: a real-time network visibility, a flexible architecture, limitless policy options, and automated endpoint remediation. Organizations were no longer taking lightly for defense solutions that were limited to managed devices and ‘grant or entry’ network access policies.

There are three primary reasons why many companies are adopting NAC at a furious pace: a complex network infrastructure with inherent control and endpoint visibility gaps; the unfettered practice of BYOD polices; and the need to mitigate advanced threat.

Mitigating Threats with Next-Gen NAC

As attackers are easily able to spot and compromise vulnerable endpoints, it is necessary to prepare the defenses using next generation network access control (NAC) implementations. NAC is particularly effective at addressing security gaps introduced by transient network devices. When a threat is evident, it performs the following functions:

  • Alerting you to compliance violations
  • Keeping noncompliant, vulnerable endpoints off the network
  • Remediating vulnerabilities and security misconfigurations directly or via third-party systems
  • Ensuring that host defenses are installed, up-to-date, properly configured, and enabled


When configured optimally, the next-gen NAC will provide you with more endpoint intelligence than you ever dreamt possible. It will give you a bird’s eye-view of the entire network ecosystem in real-time: devices and their types, operating systems, applications, virtual machines, security risks, network locations and a lot more.

Leveraging Next-Gen NAC

Research studies indicate that companies know approximately 80 percent of what is on their network, and at any given time, as many as 50 percent of those devices have a security or configuration issue. A full-fledged next-gen NAC can see and control—in real time—including visible and nonvisible endpoints, network devices, applications, and users. Well-equipped with passive and active network discovery techniques, today’s next-gen NAC solutions provide unprecedented, real-time network visibility to security professionals. However, a lot of misconceptions about NAC continue to dominate industry professionals, and this is fueled by the restrictions of legacy NAC offerings. At any rate, the next-gen NAC is widely gaining recognition as a core security platform and is poised to help organizations address challenging IT security issues.

Posted by: RAH Infotech | June 21, 2016

RAH Infotech Appointed National VAD by ContentKeeper

The tie-up will further strengthen RAH Infotech’s network security portfolio with proven web security solutions to secure today’s Web 2.0 and mobile centric business environments.

RAH Infotech appointed as the National Value Added Distributor (VAD) by Contentkeeper. The offerings will include providing solutions that enable organizations to protect and control gateway Internet access and to embrace mobile technology, social media and cloud-based services without compromising security.

Ashok Kumar, chief executive officer at RAH Infotech said, “ContentKeeper’s advanced, multi-layered behavioral analysis technology with high speed SSL (decrypted) packet inspection ensures mission critical Internet resources and services are protected – regardless of the device being used or where employees are. We are happy to bring their state of the art solutions to customers in India.”

“RAH Infotech has always served their customers with the best-of-breed solutions from top technology players and they continuously make efforts to enrich their portfolio and align with the customer’s evolving requirements”, further added Kumar.

“RAH is a fast growing value added distributor in India and this partnership is surely a win win for both. We look forward to working with RAH Infotech and am sure this association would lead to greater growth and a strong foundation that would help expand our business in the country,” said Pankaj Saroha, Country Manager, ContentKeeper Technologies.

Learn what they are and what is the easiest way to use them

Join Radware for an informative seminar in Mumbai and Bangalore!

Businesses need their applications to be available.  IT networks are designed to deliver applications and data reliably and securely.  It is important to understand how application visibility and performance impact business goals.  Gain insight into the nature of application networking and how application delivery controllers (ADC) can be a key component to reliable and secure applications.

Learn more from the seminar:

  • Application Service Level Assurance – The End Goal of Virtualization
  • Virtualizing Appiication Delivery – Cloud, SDN, NFV – What Does It All Mean?

If you are looking for application networking best practices, then look no further.  Radware is a global leader in application security and delivery solutions for virtual, cloud, and software defined data centers.

Time: 7:00 pm onwards

Date & Location:
Wed, June 15, 2016
The Lalit Mumbai, Sahar Airport Road, Mumbai
Register now!

Thu, June 16, 2016
Chancery Pavillion, #135 Residency Road, Bangalore
Register now!

Yaron Azerual
Product Marketing ManagerRadware

Space is limited and advance registration is required!

F-Secure Rapid Detection Service combines decoy sensors, threat intelligence, and 24/7 monitoring by a team of cyber security experts to help companies fight cyber attacks.

If you aren’t seeing security incidents, you’re probably missing something. That’s the message from F-Secure as it launches a unique new intrusion detection and incident response service to uncover threats in the corporate network. The managed service combines the best of human and machine intelligence with a promise to notify companies within just 30 minutes of a breach detection.

The average data breach can take weeks, months or even years to detect. According to Gartner, the greatest area of unmet need is effective targeted attack and breach detection. Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization.* Many companies rely solely on a defensive perimeter to protect them, which is crucial but only one part of a holistic cyber security strategy. With advanced threat actors who perform highly targeted attacks on organizations, an attack attempt will eventually bypass security controls and succeed in penetrating the network. The ability to quickly detect intrusions and immediately respond to them is critical – but that’s not easy to come by.

Man & machine: The best of both

F-Secure Rapid Detection Service leverages the strengths of both human and machine intelligence to provide an all-in-one intrusion detection and response service that’s ready to go immediately. The service consists of three major components: Endpoint and Network Decoy sensors that collect data about events and activities; F-Secure’s threat intelligence and behavioral analytics, which analyze the data to identify anomalies; and the Rapid Detection Center, which is staffed 24/7 by a team of cyber security experts who identify and handle incidents. When a breach is detected, an expert will contact the customer within just 30 minutes with incident response and to offer optional onsite investigative services if needed.

Respond with actionable intelligence

Once a breach has been detected, Rapid Detection Service also provides actionable intelligence for the response phase. The customer’s security team will learn exactly how the breach happened, how to isolate it, and get advice on remediation. With quick detection, an accurate diagnosis and expert advice on remediation, companies can limit damage and get back to business as quickly as possible. Additionally, F-Secure provides optional onsite services for incident management and forensic investigations.

With the introduction of Rapid Detection Service, F-Secure further strengthens its status as the leading European cyber security company. Rapid Detection Service easily integrates with any existing ecosystem and provides an additional layer of security to enhance the organizational cyber security strategy.

*Source: Gartner Magic Quadrant for Security Information & Event Management, Kelly M. Kavanagh, Oliver Rochford, published 20 July 2015

Check Point Software Technologies announced it has once again been positioned as a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls. The new report evaluated the company’s ‘completeness of vision’ and ability to execute in areas such as security management and threat prevention. Check Point has been positioned as a Leader in Enterprise Network Firewalls since 1997.

“The Leaders quadrant contains vendors that build products that fulfill enterprise requirements. These requirements include a wide range of models, support for virtualization and virtual LANs, and a management and reporting capability that is designed for complex and high-volume environments, such as a multitier administration and rule/policy minimization. A solid NGFW capability is an important element, as enterprises continue to move away from having dedicated IPS appliances at their perimeter and remote locations. Vendors in this quadrant lead the market in offering new features that protect customers from emerging threat, provide expert capability rather than treat the firewall as a commodity, and have a good track record of avoiding vulnerabilities in their security products. Common characteristics include handling the highest throughput with minimal performance loss, offering options for hardware acceleration and offering form factors that protect enterprises as they move to a new infrastructure form factors,” states Gartner.i

With a focus on helping business of all sizes stay one step ahead of cybercriminals, Check Point’s comprehensive approach to security includes industry-recognized technology such as Next-Generation Firewalls, Next-Generation Threat Prevention, mobile security, cloud security solutions and security management.

Over the last year, Check Point’s road map has been defined by a number of new technology solutions designed to better enable customers and ultimately transform the security industry:

  • Check Point expanded its Threat Prevention portfolio with SandBlast, SandBlast Agent and SandBlast Cloud, bringing to market the first CPU-level threat prevention and threat extraction technologies.
  • A host of new appliances gives organizations of any size, from small businesses to large-scale deployments, the power to run advanced threat prevention capabilities such full inspection of encrypted data, without compromising performance.
  • The new R80 security management platform addresses the sprawling complexity of securing today’s modern enterprise, delivering the ability to consolidate all aspects of a security environment into one single place, further paving the way for new-levels of automation capabilities for time-consuming security tasks.
  • Check Point offers its firewall over Amazon Web Services and Microsoft Azure for public cloud support and integrates with VMware NSX for software-defined networking use cases.
  • Mobile Threat Prevention stops threats on iOS and Android platforms, delivering real-time threat intelligence and visibility for existing security and mobility infrastructures.

To access the 2016 Gartner Magic Quadrant for Enterprise Firewall Market Report: /resources/gartner-leader-enterprise-network-firewall/index.html.

Comprehensive, Automated Cloud Protection Service Continuously Adapts to Offer Fastest Threat Detection and Mitigation

Change has always been a threat to businesses, but the rate at which cybersecurity threats and applications evolve adds new urgency for organizations to adapt. Radware, a leading provider of cyber security and application delivery solutions ensuring optimal service level for applications in virtual, cloud and software defined data centers, is helping them do so with an expanded portfolio of Cloud Security Services that continuously adapts in step with evolving threats and ongoing development of applications.

Radware now offers a full suite of cloud protection services that can give organizations the optimal protection they need and fit within their unique network and application environments.

This new Cloud Security Service offering is the only adaptive solution that combines cloud DDoS, volumetric, and application firewall attack protection into a configuration that is unique to the client’s needs, whether that is an always-on, on-demand, or hybrid solution. Once installed, Radware’s Cloud Security Services will automatically adapt to evolving threats and protected assets.

Cyberattacks evolve at a blinding pace. To protect themselves, organizations must regularly adjust to the changing environment and minimize human intervention. For businesses with cloud-based network infrastructure, or that don’t have the bandwidth to support comprehensive in-house security resources, this new offering can provide much-needed protection.

Radware’s new suite of Always-On Cloud Security Services will automatically detect and mitigate a wide range of attack vectors, including DDoS, burst attacks, complex volumetric attacks, SSL-based attacks, zero-day attacks, SQL injections, and more. In fact, it is the only cloud-based solution available today that can mitigate SSL-based attacks while maintaining user data confidentiality. This means that the organization can remain focused on business operations, while Radware addresses the attack.

The evolution of the cyberattack landscape is not the only risk to an organization’s network security. Whether in a cloud, hybrid cloud, or data center environment, the fluidity of application development and modification can also create a bevy of unintended security risks. Radware’s new suite of cloud security service is the first continuously adaptive service that automatically generates protections for 0-day attacks within seconds and continuously adjusts to new applications and updates required protections.

Radware’s Cloud Security Services address these issues with cloud WAF and DDoS protection technologies that provide the widest security coverage. The services offer:

  • The first continuously adaptive web security service that automatically adapts to evolving threats and protected assets by:
    • Automatically generating protections for zero-day attacks within seconds through behavioral-based detection coupled with real-time signature creation.
    • Automatically identifying, blacklisting and blocking machines that are used for attacks regardless of IP they hide behind through IP-agnostic fingerprinting technology.
    • Automatically detecting and protecting new applications as they’re added to the network through automatic policy generation technology.
  • The only SSL-attack mitigation in the cloud that maintains user data confidentiality and removes operational dependencies between a service provider and the organization when keys are changed. The solution also allows for use of wildcard certificates to reduce operational complexity when needing to protect a large number of subdomains.
  • Fully managed 24/7 service for both on-premise and cloud-based deployments, covering both WAF and DDoS protection. Delivered by battle-proven security experts, this service provides full visibility for security status and attack to your mobile device.
  • Over 2TB of mitigation capacity and dedicated scrubbing centers that segregate clean and DDoS attack traffic as part of a robust global cloud security network.

Businesses of all sizes are attacked on a daily basis. This cloud-only offering presents a viable enterprise-grade option for a wide range of organizations to defend themselves from growing cybersecurity threats.

For more information on Radware Cloud Security Services, visit

New SandBlast Cloud proactively prevents the latest known and unknown malware from reaching Microsoft Office 365™ email customers

As enterprises undergo a rapid migration towards the use of cloud infrastructure for email, Check Point® Software Technologies Ltd. announced SandBlast Cloud to protect organizations from the ongoing trend of cyber criminals using email as a primary entry point for attacks. As the newest member of its industry-leading SandBlast family of solutions, SandBlast Cloud is designed to safeguard Microsoft Office 365 email customers from modern, sophisticated threats such as ransomware and APTs, allowing organizations to move to cloud infrastructure with confidence. SandBlast Cloud also includes Check Point’s unique CPU-level detection and Threat Extraction capabilities, proactively preventing attacks from reaching users.

While email has enabled communication and information to be distributed more efficiently than ever before, it also is a leading vehicle for the delivery of malware, including ransomware. According to the 2016 Verizon Data Breach Investigations Report, email attachments are the most common avenue for crimeware delivery, noting users opened and clicked on about 12 percent of malicious attachments they received. Combined with the fact that the median time to first click these attachments was only 3 minutes and 45 seconds from initial receipt, it becomes clear that preventing these malicious files from reaching users in the first place is critical to avoiding infection.

Enterprises are increasingly at risk of falling victim to a targeted email attack, and hackers’ methods are constantly evolving, requiring enterprises to use proactive, sophisticated security measures in order to stay one step ahead of the latest threats. SandBlast Cloud brings one of the highest levels of protection in the industry to Office 365 email customers in a pure cloud solution that delivers safe content quickly, with full visibility and management through its cloud-based portal.

In the constant battle to protect themselves from malicious email that can cause data breaches, financial loss and reductions in productivity, businesses need a sophisticated cloud email security solution that not only prevents infection from existing malware, but proactively identifies and stops unknown threats the first time. SandBlast Cloud provides Office 365 users with multi-layered defenses to protect from both known and unknown threats. Also, Antivirus and URL Reputation protection secure users from known threats, while advanced capabilities including Threat Emulation and Threat Extraction prevent unknown malware and zero-day threats from reaching end-users.

Key features of SandBlast Cloud include:

  • Seamless integration with Microsoft Office 365, managed as simple cloud solution that is easy to implement.
  • Highest malware catch rate in the industry, utilizing patented CPU-level inspection technology.
  • The delivery of safe, reconstructed versions of common document formats in seconds, and full access to original files in minutes once full analysis is complete.


SandBlast Cloud will be available summer 2016. To learn more about SandBlast Cloud, visit

« Newer Posts - Older Posts »