Posted by: RAH Infotech | September 12, 2016

RAH Infotech bags “Outstanding contribution Award” from F-Secure


RAH Infotech, a leading value added distributor in India was awarded “Outstanding contribution Award for 1H 2016” by F-Secure at the recently held F-Secure Channel Partner Meet “Let’s Create Value Together” on 2nd September 2016 at Hotel Lalit, Mumbai.

The channel meet was presided over by Mr.Jaakko Hyttinen, F-Secure Vice President, Global Corporate Sales and Mr. Jimmy Ruokolainen, F-Secure Vice President, Product Management. The meet was attended by over 200 partners from 90 organisations where partners were recognized for their contribution to F-Secure business in India.

This is the second award in a row for RAH Infotech from F-Secure. Earlier this year, RAH Infotech had bagged “Best Execution Partner 2015” from the European cyber security company.


WinMagic, a global leader in encryption management, has entered into a strategic tie-up with RAH Infotech, a leading value added distributor in India. The collaboration is aimed at leveraging the synergies of the two partners to help organizations minimize business risks, meet privacy and regulatory compliance requirements and protect valuable information assets against unauthorized access.

Rahul Kumar, Country Manager, WinMagic India Pvt. Ltd., shared “Within an enterprise, there are a wide variety of systems and processes that make data security complex and challenging. To ensure the success of your IT infrastructure as it grows, it’s critical to host and manage the keys to encryption effectively.”

“RAH Infotech as our distributor will play an instrumental role in enhancing our channel base by helping us reach out to various untapped markets across India. We are confident that the channel strength that RAH Infotech brings and the innovation in technology that WinMagic is known for will work in synergy to our mutual advantage in India. This tie-up would enable us to meet the ever changing demands of customers,” he added further.

Mr Ashok Kumar, Chief Executive Officer at RAH Infotech said, “When companies bring teams into a centralized data security management environment such as WinMagic SecureDoc Enterprise Server (SES), you have better control over who can access and see files on your network. With their powerful application-aware platform, companies will be able to instantly gauge the health of their security keys within a single-pane view, making it faster to administer and execute manual security tasks across any platform.”

“RAH Infotech’s focus is on providing excellence to our partners while successfully introducing and establishing new technology vendors in the market and strengthen existing vendors’ market share. This association with WinMagic will help us reinforce our support to our esteem partners and customers,” further added Ashok.

Posted by: RAH Infotech | September 7, 2016

Radware Positioned as Leader in Gartner Magic Quadrant 2016

Radware’s Seventh Inclusion in the ADC Magic Quadrant for application delivery controllers; Evaluation Based on Completeness of Vision and Ability to Execute.

Radware has been positioned in the Leaders Quadrant for its Application Delivery Controllers in the September, 2016 Magic Quadrant for Application Delivery Controllers (ADC).

“We believe that Radware’s continued recognition in Gartner’s Magic Quadrant for Application Delivery Controllers is proof-positive of our commitment to the ADC category, especially in the face of rapidly changing needs in IT Infrastructure,” said Sharon Trachtman, Chief Marketing Officer for Radware.  “Companies turn to Radware because they require their mission critical business applications to be available and performing optimally at all times. The combination of Radware’s strong architectural approach, the powerful security integrations, and the advanced customization, automation and programmability of Radware’s offerings are what keep our customers up and running.”

Radware’s comprehensive technology portfolio includes a full suite of appliances, software solutions, virtual licensing, cloud and OTT cloud services that ensure businesses see an optimal application service level delivery and receive a fast return on their investment in any network configuration.

Radware’s next generation application delivery controller (ADC) is the only ADC that guarantees application service levels with the ability to assign a fully isolated vADC per application or service. Alteon NG offers high vADC density and has a deep set of integrated security capabilities, including DDoS, SSL inspection, WAF, device/user fingerprinting, and defense messaging capabilities.

Radware’s unified management and orchestration framework for ADC and security technologies provides customers with a full array of models from production level testing/evaluation software versions on up to carrier-grade platforms.

Radware includes application performance monitoring (APM), single sign-on (SSO), web application firewall (WAF), advanced Denial of Service (ADoS), multi-homing/enterprise gateway, and web performance optimization (WPO) capabilities as advanced services within their ADC technology. Radware application delivery architecture supports SDN and NFV environments to meet the evolving data center environment requirements. Radware also integrates with industry-leading infrastructures, including Cisco’s ACI, VMware NSX, OpenStack, Ansible, Chef and Puppet.

The company has also offered for more than half a decade a ‘pay-as-you-grow’ software upgrade model for its platforms, which has extended over the years to other products in its portfolio to ensure customers enjoy the best price-to-performance solutions to meet growing and not stagnant or locked-in bandwidth needs.

Trachtman added, “We are dedicated to delivering the most advanced, agile and powerful solutions in the industry no matter how standard, hybrid or cloud-based an infrastructure may be.”

The description for the leaders quadrant according to Gartner is as follows: “a Leader exhibits the ability to shape the market by introducing capabilities in its product offerings and by raising awareness of the importance of these features. Key capabilities for a Leader in this market revolve around enterprise application functionality. We expect a Leader to have strong or growing market share and to have solutions that resonate with an increasing number of enterprises. We expect Leaders to release ADC capabilities (deployment models, features, pricing models and so on) well in advance of mainstream enterprise demand. A Leader must exhibit expertise in complex enterprise application environments and offer a range of deployment models.”

RAH Infotech recently added another feature in its cap of strong business partners. The company has tied up with Data Resolve, an emerging player in the area of Cyber Security and Intelligence for Enterprises.

Dhruv Khanna, CEO & Director, Data Resolve Technologies shared “ We are focused on addressing issues related to corporate fraud, data leak and employee productivity with security analytics via end points, from in-premise and on-cloud platforms, with products christened as “inDefend – Solution for Insider Threat Management for Desktop and Laptops” and “MobSec – Solution for Mobile Workforce Management for Smart Devices”.

“We are excited to take our business to newer heights with this association with RAH Infotech. They clearly are leaders in value added distribution and solutions provider in the Network and Security domain”, added Mr. Khanna.

The constant barrage of cyber-attacks and threats has created a need to prevent data leak attempts from inside and outside the organization. Although many solutions are available in the market today that focus on preventing data leakage but they fail to launch attempts to inhibit internal digital impendence before it consumes the entire organizations’ resource.

Mr Ashok Kumar, chief executive officer at RAH Infotech said, “Data Resolve Technologies is in the prime business of providing detailed real-time information on data leakage reducing the business risks and protecting data from insider threats throughout its lifecycle. The core concept behind their technology is to help organizations detect human behaviour well before incidents occur including time spent by end users in productive and unproductive work, sensitive online searches and chats among the peers. We are delighted to be associated with Data Resolve and are looking forward taking their solutions to our customers” he added.


Radware 2016 Executive Application & Network Security Survey Also Finds Telecommuting, Internet of Things, and Wearables Are Among Rising Security Concerns.

How many businesses will pay a ransom if attacked? It might depend on if they have already been a victim of ransomware. Some 84 percent of U.S. and U.K. information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 percent paid, according to Radware’s 2016 Executive Application & Network Security Survey.

Radware, a leading provider of cybersecurity and application delivery solutions ensuring optimal service level for applications in virtual, cloud, and software-defined data centers, polled more than 200 IT executives across the U.S. and U.K. The study found that U.S. companies were far more willing to admit that they would pay a ransom. Among U.S. firms who had not been attacked, 23 percent indicated they were prepared to pay a ransom, in contrast to the 9 percent in the U.K.

Companies that paid ransoms reported an average of $7,500 in the U.S. and £22,000 in the U.K.

“This is a harbinger of the challenging decisions IT executives will face in the security arena,” said Carl Herberger, Radware’s Vice President of Security Solutions. “It’s easy to say you won’t pay a ransom until your system is actually locked down and inaccessible. Organizations that take proactive security measures, however, reduce the chance that they’ll have to make that choice.”

In addition to the responses to ransom attacks, Radware’s 2016 Executive Application & Network Security Survey found which security threats most weigh on the minds of the C-suite and senior executives.

Former hackers are seen as reliable watchdogs: Senior executives see former bad guys as the best way to test their systems. Some 59 percent of respondents said they either had hired ex-hackers to help with security or were willing to do so, with one respondent saying, “Nothing beats a poacher turned gamekeeper.”

Firms see telecommuting as security risk: Work-from-home arrangements are seen as an increasing risk. The survey found a big jump in changes to telecommuting policies, with 41 percent of respondents saying they have tightened work-from-home security policies in the last two years.

Wearables require more than a dress code: While about one in three companies implemented security policies around wearables in the last two years, 41 percent said they still have no rules in place, leaving a growing number of end points potentially vulnerable. Perhaps this is because wearables aren’t seen as a major target—only 18 percent pointed to wearables when asked what hackers would most likely go after in the next three to five years.

New connected devices will be the next security frontier: While wearables were less of a concern, many executives surveyed think the Internet of Things (IoT) could become a bona fide security problem. Some 29 percent said IoT devices were extremely likely to be top avenues for attacks, similar to the percentage of nods received for network infrastructure, which received 31 percent.

Cleaning up after a cyberattack can be expensive: More than a third of respondents in the U.S. said an attack had cost them more than $1 million, and 5 percent said they spent more than $10 million. Costs in the U.K. were generally lower, with 63 percent saying an attack had cost less than £351,245 or about $500,000, though 6 percent claimed costs above £7 million.

Security risk is business risk: Whether motivated by ransomware or another factor, attacks impose significant reputational and operational costs on victims. When executives named the top two risks they face from cyberattacks, brand reputation loss led the pack, with 34 percent of respondents choosing that as a big fear. Operational loss (31 percent), revenue loss (30 percent), productivity loss (24 percent), and share price value (18 percent) were also included in the top concerns.


On behalf of Radware, Merrill Research surveyed 205 IT executives (104 in the U.S. and 101 in the U.K.) in April and May 2016. To participate in the 2016 Executive Application & Network Security respondents were required to be at a company with at least $50 million (or equivalent) in revenue and hold a title of senior vice president level or higher. By design, the survey’s respondents were equally split between C-level executives and senior vice presidents. About half of the companies in the survey have 1,000 to 9,999 employees, averaging about 3,800.


Posted by: RAH Infotech | June 28, 2016

Next-Gen NAC: A Game Changer in Network Security Solutions

Authored By Ashok Kumar, MD & CEO, RAH Infotech Pvt. Ltd.
NAC’s incarnation, next-gen NAC, offers tremendous value and advantages that can be applied across a variety of security requirements, policies, and controls

Not a day passes without the news of a major data breach. Although enterprises are spending billions on network defences, they are constantly being subjected to attacks that seem to confound all. According to the 2015 Cyber Threat Defense Report, more than 71% of respondents’ networks were breached and nearly 60% have reported an increase in mobile threats.

Cyber threats are constantly evolving and becoming more sophisticated than ever. The attackers are organized, skilled, and highly motivated. They know that it’s easier to compromise vulnerable endpoints than to directly target servers and databases. On their part, companies too make their vulnerabilities evident when they fall behind in undertaking patching efforts, have inactive host defences, and lack BYOD controls. They find it difficult to secure their weakest links: mobile phones, social media, and laptops and tablets. With most of the users having active social accounts on their mobiles and tablets, attackers indulge in tactics such as spear phishing and waterholing to trick unsuspecting users into sharing access credentials or downloading malware-infected files. Once the users have fallen to the ruse, it takes only a moment for hackers to breach the security and exploit other less secure systems.

The Second Coming of a New, Powerful NAC


Network access control (NAC) has always been the talk of IT security professionals for well over a decade since it first made its appearance. NAC is a network security solution designed to grant, limit, or deny access to network resources through policies defining acceptable or unacceptable users, devices, and application properties. It provided them with a means to limit access to healthy devices. But device authentication came at a cost: it was cumbersome, costly to implement, and often disrupting users. As organizations begin to tolerate wireless, mobile devices and institute bring-your-own-device (BYOD) polices, the chorus grew for a new, powerful network defense system: the next-gen NAC. The need was very specific: a real-time network visibility, a flexible architecture, limitless policy options, and automated endpoint remediation. Organizations were no longer taking lightly for defense solutions that were limited to managed devices and ‘grant or entry’ network access policies.

There are three primary reasons why many companies are adopting NAC at a furious pace: a complex network infrastructure with inherent control and endpoint visibility gaps; the unfettered practice of BYOD polices; and the need to mitigate advanced threat.

Mitigating Threats with Next-Gen NAC

As attackers are easily able to spot and compromise vulnerable endpoints, it is necessary to prepare the defenses using next generation network access control (NAC) implementations. NAC is particularly effective at addressing security gaps introduced by transient network devices. When a threat is evident, it performs the following functions:

  • Alerting you to compliance violations
  • Keeping noncompliant, vulnerable endpoints off the network
  • Remediating vulnerabilities and security misconfigurations directly or via third-party systems
  • Ensuring that host defenses are installed, up-to-date, properly configured, and enabled


When configured optimally, the next-gen NAC will provide you with more endpoint intelligence than you ever dreamt possible. It will give you a bird’s eye-view of the entire network ecosystem in real-time: devices and their types, operating systems, applications, virtual machines, security risks, network locations and a lot more.

Leveraging Next-Gen NAC

Research studies indicate that companies know approximately 80 percent of what is on their network, and at any given time, as many as 50 percent of those devices have a security or configuration issue. A full-fledged next-gen NAC can see and control—in real time—including visible and nonvisible endpoints, network devices, applications, and users. Well-equipped with passive and active network discovery techniques, today’s next-gen NAC solutions provide unprecedented, real-time network visibility to security professionals. However, a lot of misconceptions about NAC continue to dominate industry professionals, and this is fueled by the restrictions of legacy NAC offerings. At any rate, the next-gen NAC is widely gaining recognition as a core security platform and is poised to help organizations address challenging IT security issues.

Posted by: RAH Infotech | June 21, 2016

RAH Infotech Appointed National VAD by ContentKeeper

The tie-up will further strengthen RAH Infotech’s network security portfolio with proven web security solutions to secure today’s Web 2.0 and mobile centric business environments.

RAH Infotech appointed as the National Value Added Distributor (VAD) by Contentkeeper. The offerings will include providing solutions that enable organizations to protect and control gateway Internet access and to embrace mobile technology, social media and cloud-based services without compromising security.

Ashok Kumar, chief executive officer at RAH Infotech said, “ContentKeeper’s advanced, multi-layered behavioral analysis technology with high speed SSL (decrypted) packet inspection ensures mission critical Internet resources and services are protected – regardless of the device being used or where employees are. We are happy to bring their state of the art solutions to customers in India.”

“RAH Infotech has always served their customers with the best-of-breed solutions from top technology players and they continuously make efforts to enrich their portfolio and align with the customer’s evolving requirements”, further added Kumar.

“RAH is a fast growing value added distributor in India and this partnership is surely a win win for both. We look forward to working with RAH Infotech and am sure this association would lead to greater growth and a strong foundation that would help expand our business in the country,” said Pankaj Saroha, Country Manager, ContentKeeper Technologies.

Learn what they are and what is the easiest way to use them

Join Radware for an informative seminar in Mumbai and Bangalore!

Businesses need their applications to be available.  IT networks are designed to deliver applications and data reliably and securely.  It is important to understand how application visibility and performance impact business goals.  Gain insight into the nature of application networking and how application delivery controllers (ADC) can be a key component to reliable and secure applications.

Learn more from the seminar:

  • Application Service Level Assurance – The End Goal of Virtualization
  • Virtualizing Appiication Delivery – Cloud, SDN, NFV – What Does It All Mean?

If you are looking for application networking best practices, then look no further.  Radware is a global leader in application security and delivery solutions for virtual, cloud, and software defined data centers.

Time: 7:00 pm onwards

Date & Location:
Wed, June 15, 2016
The Lalit Mumbai, Sahar Airport Road, Mumbai
Register now!

Thu, June 16, 2016
Chancery Pavillion, #135 Residency Road, Bangalore
Register now!

Yaron Azerual
Product Marketing ManagerRadware

Space is limited and advance registration is required!

F-Secure Rapid Detection Service combines decoy sensors, threat intelligence, and 24/7 monitoring by a team of cyber security experts to help companies fight cyber attacks.

If you aren’t seeing security incidents, you’re probably missing something. That’s the message from F-Secure as it launches a unique new intrusion detection and incident response service to uncover threats in the corporate network. The managed service combines the best of human and machine intelligence with a promise to notify companies within just 30 minutes of a breach detection.

The average data breach can take weeks, months or even years to detect. According to Gartner, the greatest area of unmet need is effective targeted attack and breach detection. Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization.* Many companies rely solely on a defensive perimeter to protect them, which is crucial but only one part of a holistic cyber security strategy. With advanced threat actors who perform highly targeted attacks on organizations, an attack attempt will eventually bypass security controls and succeed in penetrating the network. The ability to quickly detect intrusions and immediately respond to them is critical – but that’s not easy to come by.

Man & machine: The best of both

F-Secure Rapid Detection Service leverages the strengths of both human and machine intelligence to provide an all-in-one intrusion detection and response service that’s ready to go immediately. The service consists of three major components: Endpoint and Network Decoy sensors that collect data about events and activities; F-Secure’s threat intelligence and behavioral analytics, which analyze the data to identify anomalies; and the Rapid Detection Center, which is staffed 24/7 by a team of cyber security experts who identify and handle incidents. When a breach is detected, an expert will contact the customer within just 30 minutes with incident response and to offer optional onsite investigative services if needed.

Respond with actionable intelligence

Once a breach has been detected, Rapid Detection Service also provides actionable intelligence for the response phase. The customer’s security team will learn exactly how the breach happened, how to isolate it, and get advice on remediation. With quick detection, an accurate diagnosis and expert advice on remediation, companies can limit damage and get back to business as quickly as possible. Additionally, F-Secure provides optional onsite services for incident management and forensic investigations.

With the introduction of Rapid Detection Service, F-Secure further strengthens its status as the leading European cyber security company. Rapid Detection Service easily integrates with any existing ecosystem and provides an additional layer of security to enhance the organizational cyber security strategy.

*Source: Gartner Magic Quadrant for Security Information & Event Management, Kelly M. Kavanagh, Oliver Rochford, published 20 July 2015

Check Point Software Technologies announced it has once again been positioned as a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls. The new report evaluated the company’s ‘completeness of vision’ and ability to execute in areas such as security management and threat prevention. Check Point has been positioned as a Leader in Enterprise Network Firewalls since 1997.

“The Leaders quadrant contains vendors that build products that fulfill enterprise requirements. These requirements include a wide range of models, support for virtualization and virtual LANs, and a management and reporting capability that is designed for complex and high-volume environments, such as a multitier administration and rule/policy minimization. A solid NGFW capability is an important element, as enterprises continue to move away from having dedicated IPS appliances at their perimeter and remote locations. Vendors in this quadrant lead the market in offering new features that protect customers from emerging threat, provide expert capability rather than treat the firewall as a commodity, and have a good track record of avoiding vulnerabilities in their security products. Common characteristics include handling the highest throughput with minimal performance loss, offering options for hardware acceleration and offering form factors that protect enterprises as they move to a new infrastructure form factors,” states Gartner.i

With a focus on helping business of all sizes stay one step ahead of cybercriminals, Check Point’s comprehensive approach to security includes industry-recognized technology such as Next-Generation Firewalls, Next-Generation Threat Prevention, mobile security, cloud security solutions and security management.

Over the last year, Check Point’s road map has been defined by a number of new technology solutions designed to better enable customers and ultimately transform the security industry:

  • Check Point expanded its Threat Prevention portfolio with SandBlast, SandBlast Agent and SandBlast Cloud, bringing to market the first CPU-level threat prevention and threat extraction technologies.
  • A host of new appliances gives organizations of any size, from small businesses to large-scale deployments, the power to run advanced threat prevention capabilities such full inspection of encrypted data, without compromising performance.
  • The new R80 security management platform addresses the sprawling complexity of securing today’s modern enterprise, delivering the ability to consolidate all aspects of a security environment into one single place, further paving the way for new-levels of automation capabilities for time-consuming security tasks.
  • Check Point offers its firewall over Amazon Web Services and Microsoft Azure for public cloud support and integrates with VMware NSX for software-defined networking use cases.
  • Mobile Threat Prevention stops threats on iOS and Android platforms, delivering real-time threat intelligence and visibility for existing security and mobility infrastructures.

To access the 2016 Gartner Magic Quadrant for Enterprise Firewall Market Report: /resources/gartner-leader-enterprise-network-firewall/index.html.

« Newer Posts - Older Posts »