Technology partnership

Automate enterprise threat intelligence and response with Malwarebytes and ServiceNow

Automate enterprise threat intelligence and response with Malwarebytes and ServiceNow There are a vast array of challenges facing organisations with large and complex networks. Such networks require an intricate and balanced array of tools to ensure they are secure and run efficiently. Many organisations report using more than 50 security tools, with other larger enterprises...
Data keys in the cloud

How to own your data keys in the cloud

How to own your data keys in the cloud Things are looking good, I am migrating nearly all my services to “the Cloud” and just like everyone else,( we’re all using Software as a Service to some degree), we’ve already migrated email, collaboration, file storage, and our customer relationship management. We are even contemplating moving...
Bitdefender & Kite Distribution

Partner channel update: Bitdefender sign Kite as UK distributor

Partner channel update: Bitdefender sign with Kite as UK distributor Bitdefender reveal their cyber security predictions and opportunities for partners & why they have signed with Kite Distribution as a UK distributor in this Q&A with Christian Stanford, Senior Director EMEA Channels at Bitdefender. Bitdefender is a global cybersecurity leader protecting over 500 million systems...

Modern-day Data Encryption

Modern-day Data Encryption Data encryption itself is easy to understand, where the complexities lie are in deciding what data needs to be encrypted? Where does that data reside (file servers, databases or cloud)? Who has access to the data? And what levels of access should they have? Admin personnel may need access to files but not...

Emotet – The Chameleon Trojan

Emotet – The Chameleon Trojan Like a fine wine Emotet has only become more sophisticated with age. The Trojan, first identified in 2014, began its life as banking malware but has gone on to include both spam and malware delivery services. Emotet is polymorphic, meaning it can change each time it is downloaded, allowing it...

Thales eSecurity & Kite Distribution join forces

Thales eSecurity & Kite Distribution join forces Thales eSecurity and Kite Distribution Ltd have joined forces in the battle against cybercrime. Kite Distribution are a UK focused, value-added distributor that specialises in bringing innovative and disruptive technologies to the UK channel. Their management team have over 50 years of accumulated channel experience, including launching and...

Visibility beyond TLS1.3

Visibility beyond TLS1.3 After the 28th draft, the ink has finally dried on the approval of TLS1.3 into the industry but how did we get here? Well, there was an upmost urgency to come up with robust treatment of encrypted data. Various systematic vulnerabilities were exposed in the attacks of Heartbleed (2014), Poodle (2014), Logjam...

Threat Hunting – Is your security stance proactive or reactive?

Threat Hunting – Is your security stance proactive or reactive? Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment. The goal is to proactively detect malicious activity by forming hypotheses about how attackers may have penetrated defences, which systems are compromised, and what data...

ExtraHop Partners with Kite Distribution to Extend Reveal(x) to Security Markets

ExtraHop partners with Kite Distribution to extent Reveal(x) to security markets London, UK – July 11, 2018 – ExtraHop, the leader in analytics for security and performance management, today announced a partnership with Kite Distribution to connect UK enterprises with the advanced security insights that shed light into the darkspaces left by other security tools. ExtraHop...

What happens when Plan A fails?

What happens when Plan A fails? Patching, classifying risks, finding vulnerabilities, the list of trying to manage a network against ransomware is endless and an IT Admins nightmare. Is anti-virus covering all the bases to protect your endpoints from every threat, phishing, user error, PUPs (the list goes on)? With the latest facts found by...