Cybersecurity – MEC Networks Corporation https://mec.ph Your Partner in Innovation: The ICT and Physical Security Distributor in the Philippines Thu, 04 Apr 2024 03:32:29 +0000 en-US hourly 1 https://storage.googleapis.com/stateless-mec-ph-storage/2021/04/2a9b1c0d-cropped-mec-logo-email-signature-32x32.png Cybersecurity – MEC Networks Corporation https://mec.ph 32 32 SonicWall: Be Cyber Smart in These 4 Practical Ways https://mec.ph/news/be-cyber-smart-in-4-ways/ Fri, 11 Mar 2022 00:56:19 +0000 https://mec.ph/?p=59685 You are not paranoid; cyber attackers are trying to breach your security and exploit your data. The proof is in the numbers. According to the popular Mid-Year Update for the 2021 SonicWall Cyber Threat Report, ransomware attacks rose to 304.6 million in 2020, up 62% over 2019. Some of the increase occurred as more of the U.S.… Continue reading SonicWall: Be Cyber Smart in These 4 Practical Ways

The post SonicWall: Be Cyber Smart in These 4 Practical Ways appeared first on MEC Networks Corporation.

]]>

You are not paranoid; cyber attackers are trying to breach your security and exploit your data.

The proof is in the numbers. According to the popular Mid-Year Update for the 2021 SonicWall Cyber Threat Report, ransomware attacks rose to 304.6 million in 2020, up 62% over 2019. Some of the increase occurred as more of the U.S. workforce started working remotely due to the pandemic. There were also 226.3 million ransomware attacks through May of 2021, up 116% year to date over last year.

Some people may disregard the recommendation and throw caution to the wind. If they’re fortunate, it’ll be an insignificant inconvenience, and their anti-virus software will stop the malware before it can cause serious damage. However, if they’re among the growing thousands of victims each year, hackers will force them to pay a ransom for their precious data or steal their identity or worse. And you wonder, what could be worse?

One hack of a single individual can usher a deluge of hacks and much larger problems. For instance, hackers can crack into your personal computer without you knowing it, add malware to one of your devices that unloads wherever you go, and circumvent firewalls and other security, directly into your home network, friend’s house, the library, and your workplace.

We all could be a little more mindful. A “cybersecure mindset” protects you, your devices, and your data and everywhere you connect your devices. So, when we say, “Be Cyber Smart and Lock It Down,” what we mean is taking personal responsibility for not only how you connect but also actions you take to maintain and enhance your security.

4 Ways to Be Cyber Smart

1. PROTECT yourself.

Start with passwords: lockdown your devices, software, and information with strong passwords that protect you from becoming an easy target.

 

There are some fundamental rules for good passwords. The first is the length – a minimum of 12 characters, with a mix of uppercase and lowercase letters. You should also have numbers and symbols (ex: @ # $). Check with your platform; they may have specific requirements like the length and number, and type of symbols. One very important rule: ensure that your password is unique. Avoid obvious hooks, like your address, recognizable names, dates, and phone numbers. Avoid any information that someone may learn by reading your social media profiles. The second is: USE YOUR PASSWORDS and turn on two-step verification wherever you can.

2. PROTECT your personal identification.

Personal privacy is a question of choice. For the sake of convenience, we’d like to have access to certain items (shopping and health apps, for instance).

 

However, being cyber smart entails that the privacy settings you choose for your devices and apps may expose you to hacking. Knowing how hackers attack devices and steal information from open apps is part of being “smart” about cybersecurity. According to security experts, you should tweak your privacy settings based on the tasks you need to complete. Change your privacy settings, for example, when the circumstances change, such as when traveling or using public networks (e.g., coffee shop Wi-Fi, more on that later).

3. PROTECT your data.

Your data (pictures, reports, accounting, proprietary documents) are perhaps your most vulnerable assets. We should also take extra precautions with our social security numbers, bank account information, and credit card numbers. And when we leave data in open apps (without a password) or send it in unencrypted emails, all of that is in danger. Please keep it safe and secure by LOCKING IT DOWN! Also, keep an eye out for phishing scams. Hackers will use all techniques at their disposal to get access to your devices and network. They may impersonate organizations you trust, as well as friends, family members, coworkers, and even your boss. Phishing messages can be sent via email or text messaging. Some of these communications appear to be genuine.

4. PROTECT your devices.

Public Wi-Fi hotspots are unsafe. Unfortunately, public hotspots in your favorite coffee shop, restaurants, shopping malls, libraries, and, notably, airports are all very vulnerable to attacks. Hackers can scan unencrypted data streams such as passwords and account information that you send and receive with minimal knowledge and equipment. Scammers went even further a few years ago, creating intricate counterfeit Wi-Fi networks with names and branding marks identical to what customers expect. There are, however, a few things you may do to exercise being cyber smart before going online:

  • Be sure to turn off the Wi-Fi auto-connect feature on your devices. Turn it on only when you need it and be careful in selecting the networks you want to use.
  • Utilize secure wireless networks that contain WPA or WPA2 password protection. Sadly, these are not usually found in places like the local coffee shop or the airport, so they may be challenging to locate.
  • Consider installing mobile security software with malware and virus detection for your devices. You may also install a VPN (a virtual private network) that encrypts your data stream even if the Wi-Fi network does not.

SonicWall joined the Cybersecurity and Infrastructure Security Agency (CISA) to help raise awareness on how we can all do better to prevent hacks. That means embracing a ‘cybersecure mindset’ to protect our homes, communities, and our workplaces. 

The post SonicWall: Be Cyber Smart in These 4 Practical Ways appeared first on MEC Networks Corporation.

]]>
SonicWall Brings Home Six Awards from Network PG https://mec.ph/blogs/sonicwall-networkpg-awards/ Wed, 02 Dec 2020 20:45:11 +0000 https://mec.ph/?p=45638 We are pleased to announce that the SVUS Awards (Silicon Valley United States), organizers of the world’s premier business and innovation award programs, bestowed SonicWall with 6 trophies in the 15th Annual Network Products Guide IT World Awards 2020! Awards received by SonicWall include: Grand Trophy Winner Gold Trophy in the Enterprise Network Firewalls Division – SonicWall NSsp 15700 Gold Trophy… Continue reading SonicWall Brings Home Six Awards from Network PG

The post SonicWall Brings Home Six Awards from Network PG appeared first on MEC Networks Corporation.

]]>

We are pleased to announce that the SVUS Awards (Silicon Valley United States), organizers of the world’s premier business and innovation award programs, bestowed SonicWall with 6 trophies in the 15th Annual Network Products Guide IT World Awards 2020!

Awards received by SonicWall include:

  • Grand Trophy Winner
  • Gold Trophy in the Enterprise Network Firewalls Division – SonicWall NSsp 15700
  • Gold Trophy in the Unified or Integrated Security Division – SonicOSX 7
  • Silver Trophy in the Firewalls Division – TZ570/670
  • Bronze Trophy in the Information Security and Risk Management Division – SonicWall Network and Security Manager
  • Gold Trophy in the Security Hardware Division – SonicWall Capture and Security Appliance 1000

 

The IT World Awards are industry recognitions honoring achievements of the world’s best in organizational performance, products, services, technologies, successful deployments, product management, and customer satisfaction.

 

SonicWall took home the awards for their revolutionary architecture designed to enable contemporary features necessary for modern enterprises with excellent support, allowing customers to provide tenants with dedicated resources to enable support for unique configurations.

 

Network Products Guide was able to review the benefits that SonicWall technologies bring to compliance-sensitive customers and those who need additional tools to eliminate threats.

About SonicWall

sonicwall-logo-1-300x50

SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a working reality where everyone is remote, mobile, and not secure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile, and cloud-enabled workforces.

 

Learn more about our current SonicWall offerings, connect with us.

The post SonicWall Brings Home Six Awards from Network PG appeared first on MEC Networks Corporation.

]]>
Axis Communications Increases Product Warranty to 5 Years https://mec.ph/blogs/axis-communications-new-5-year-warranty/ Wed, 21 Oct 2020 03:44:13 +0000 https://mec.ph/?p=44811 Axis Communications announces a new 5-year product warranty at no extra cost. Key Features How about AXIS Network Video Recorders? We are glad to announce also that Axis’ Network Video Recorders, Appliances, and Desktop Terminals follow the new warranty policy, in place since October 1st. This means that all products shipped from CLC after April 1,… Continue reading Axis Communications Increases Product Warranty to 5 Years

The post Axis Communications Increases Product Warranty to 5 Years appeared first on MEC Networks Corporation.

]]>

Axis Communications announces a new 5-year product warranty at no extra cost.

This increase from the previous 3-year warranty is a result of the company’s commitment to providing high-quality products and cost-efficient, trouble-free ownership.

 

Axis has long offered an excellent hardware warranty service covering defects in design, workmanship, and material under normal use for 3 years from the date of purchase, depending on the product.  Now, customers can take advantage of a 5-year Axis warranty service free-of-charge. Valid for purchases shipped from Axis to the original purchaser on or after 1 April 2020, this new warranty ensures additional years of added peace of mind.

Key Features

  • 5-year product warranty
  • Trouble-free ownership
  • Better control of overall costs
  • Enhanced RMA support
  • First-class quality and support

How about AXIS Network Video Recorders?

We are glad to announce also that Axis’ Network Video Recorders, Appliances, and Desktop Terminals follow the new warranty policy, in place since October 1st. This means that all products shipped from CLC after April 1, 2020, will include a 5-year warranty*. This is proof that we are confident with the quality of our products and feel secure to offer such service at no additional cost.

 

*Surveillance class hard drives included in some products include 3-year limited hardware warranty. See datasheet or axis.com/warranty for details. 

AXIS Camera Station licenses tied to hardware

AXIS Camera Station licenses included in Axis Recorders and Appliances are, as of 1 October, tied to the hardware they are sold with. Meaning they cannot be transferred to a different hardware from the license portal. More information about warranty coverage details for each product can be found on the respective products’ datasheets.

 

AXIS Device Manager now offers the possibility to display the available Warranty period for any devices managed by ADM. In order to be able to retrieve this information, ADM requires the user to provide their My Axis account credentials.

The new 5-year warranty service ensures you get the most out of your investment with years of hassle-free ownership. We promise you first-class quality, reliability, and support with our excellent hardware warranty service.

 

If you’re interested in learning more about Axis Solutions, click the button below.

The post Axis Communications Increases Product Warranty to 5 Years appeared first on MEC Networks Corporation.

]]>
Fortinet Named as a Leader in Gartner’s 2020 Magic Quadrant for WAN Edge Infrastructure https://mec.ph/blogs/fortinet-magic-quadrant-2020/ Mon, 12 Oct 2020 20:21:05 +0000 https://mec.ph/?p=44744 Fortinet is a Magic Quadrant Leader! In Gartner’s recently published 2020 Magic Quadrant for WAN Edge Infrastructure, Fortinet has now been positioned in the Leader’s quadrant. Fortinet’s continuous innovation helped their Secure SD-WAN solution place higher in the ability to execute and further in the completeness of vision.   Fortinet’s SD-WAN journey began years ago, led with… Continue reading Fortinet Named as a Leader in Gartner’s 2020 Magic Quadrant for WAN Edge Infrastructure

The post Fortinet Named as a Leader in Gartner’s 2020 Magic Quadrant for WAN Edge Infrastructure appeared first on MEC Networks Corporation.

]]>

Fortinet is a Magic Quadrant Leader! In Gartner’s recently published 2020 Magic Quadrant for WAN Edge Infrastructure, Fortinet has now been positioned in the Leader’s quadrant. Fortinet’s continuous innovation helped their Secure SD-WAN solution place higher in the ability to execute and further in the completeness of vision.

 

Fortinet’s SD-WAN journey began years ago, led with a security-driven networking approach that enabled them to deliver the industry’s first Secure SD-WAN solution. Since then, they continued to innovate, delivering the world’s first purpose-built processor designed to accelerate SD-WAN functionality and security, while achieving a fully self-healing SD-WAN solution, combined with centralized orchestration to meet the diverse needs of customers worldwide.

 

The rapid adoption of cloud services and the current shift to remote workforce has accelerated the need for digital transformation. This has led customers worldwide to recognize the value of SD-WAN as they work to build a more robust WAN Infrastructure.

 

Delivering business-critical services and cloud resources in real-time ensures the best possible user experience. When combined with the assurance of secure access from anywhere ­– whether from home or branch offices or across multi-cloud environments – Fortinet Secure SD-WAN delivers a complete solution worthy of being designated as an industry leader.

Fortinet also provides one of the widest arrays of Secure SD-WAN solutions, allowing them to achieve an extensive presence across all market segments, from small retail to complex global WAN infrastructures. Part of their advantage is that by converging advanced networking and security into a unified Secure SD-WAN solution, customers are able to eliminate point products at the WAN edge to reduce cost and achieve consolidation, and for industry’s best TCO. Simplification through centralized SD-WAN orchestration also enables organizations to expedite deployment, thereby reducing complexity and associated staff hours spent on management and troubleshooting complex network issues. And its actionable analytics and reports empower IT staff to fine-tune business and security policy at scale, as well as ensure ease of change management because it enables networking and security staff to work as a unified team.

 

For 20 years, Fortinet – a recognized industry expert – has not only focused on security solutions. They also design and deliver a portfolio of advanced network and access devices that span the entire networking stack. These years of experience in building and delivering advanced routing functionalities are what led to their evolution as the industry’s first Secure SD-WAN vendor, providing robust connectivity and routing functionality combined with a full suite of advanced security. 

If you’re interested in learning more about Fortinet Solutions, click the button below.

The graphic used in this blog was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. MEC Networks do not claim any rights for this graphic.

The post Fortinet Named as a Leader in Gartner’s 2020 Magic Quadrant for WAN Edge Infrastructure appeared first on MEC Networks Corporation.

]]>
Fortinet Teleworking Solutions https://mec.ph/datasheet/fortinet-teleworking-solutions/ Wed, 24 Jun 2020 18:15:10 +0000 https://mec.ph/?p=42659 INQUIRE NOW Download Resources Now Engineered for Remote and Secure Productivity Supporting the various types of remote workers requires both security and management tools to operate at scale. Fortigate The head end for all of the VPN tunnels from the field. FortiClient EMS Enterprise Management System for FortiClient endpoints. FortiAuthenticator Authenticates the FortiTokens used by… Continue reading Fortinet Teleworking Solutions

The post Fortinet Teleworking Solutions appeared first on MEC Networks Corporation.

]]>

Engineered for Remote and Secure Productivity

security-fabric-icon min
Supporting the various types of remote workers requires both security and management tools to operate at scale.

Fortigate

The head end for all of the VPN tunnels from the field.

fortigate-1 min
forticlient min

FortiClient EMS

Enterprise Management System for FortiClient endpoints.

FortiAuthenticator

Authenticates the FortiTokens used by all remote workers.

fortiauthenticator-1 min
fortimanager min

FortiManager

Access and configure FortiGate and FortiAP devices in your network.

FortiAnalyzer

Provides reporting and analysis of the network.

fortianalyzer min
forticasb-1 min

FortiCASB

Controls access to cloud-based applications

Fortinet_white

Browse Fortinet Cybersecurity Solutions

The post Fortinet Teleworking Solutions appeared first on MEC Networks Corporation.

]]>
Fortinet Endpoint Detection and Response https://mec.ph/datasheet/fortinet-endpoint-detection-and-response/ Wed, 24 Jun 2020 00:47:27 +0000 https://mec.ph/?p=42831 INQUIRE NOW Download Resources Now Advance, automated endpoint protection, detection, and response FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. FortiEDR delivers real-time, automated endpoint protection with the orchestrated incident response across any communication device — including workstations and servers with current and legacy operating systems as well as manufacturing and OT… Continue reading Fortinet Endpoint Detection and Response

The post Fortinet Endpoint Detection and Response appeared first on MEC Networks Corporation.

]]>

Advance, automated endpoint protection, detection, and response

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection.

FortiEDR delivers real-time, automated endpoint protection with the orchestrated incident response across any communication device — including workstations and servers with current and legacy operating systems as well as manufacturing and OT systems — all in a single integrated platform, with flexible deployment options and a predictable operating cost.

fortinet-edr min
icon-1-realtime min
Real-Time Proactive Risk Mitigation & IoT Security

Enable proactive reduction of the attack surface, including vulnerability assessment and proactive risk mitigation-based policies.

icon-1-preinfection min
Pre-Infection Protection

Provide the first layer of defense via a custom-built, kernel-level Next Generation machine-learning-based Anti-Virus (NGAV) engine that prevents infection from file-based malware.

icon-1-postinfection min
Post-Infection Protection

Detect and stop advanced attacks in real-time, even when the endpoint has been compromised. No breaches, no data loss, no problem.

Features

icon-2-discoverpredict min

Discover and Predict

Deliver the most advanced automated attack surface policy control with vulnerability assessments and IoT security.

icon-2-malwareprevent min

Malware Prevention

Use a machine learning antivirus engine to stop malware pre-execution allowing users to assign anti-malware protection to any endpoint group without requiring additional installation.

icon-2-detectdefuse min

Detect and Defuse

Surgically stop data breach and ransomware damage in real-time, automatically allowing business continuity even on already compromised devices.

icon-2-respondremediate min

Respond and Remediate

Streamline incident response and remediation processes, manually or automatically roll back malicious changes done by already contained threats — on a single device or on devices across the environment. 

Fortinet_white

Browse Fortinet Cybersecurity Solutions

The post Fortinet Endpoint Detection and Response appeared first on MEC Networks Corporation.

]]>
Sonicwall Capture Client https://mec.ph/datasheet/sonicwall-capture-client/ Tue, 23 Jun 2020 23:04:29 +0000 https://mec.ph/?p=42214 INQUIRE NOW Download Resources Now Manage and Safeguard Endpoint Devices SonicWall Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including next-generation malware protection and application vulnerability intelligence.   It leverages cloud sandbox file testing, comprehensive reporting, and enforcement for endpoint protection. Additionally, provide consistent assurance of client security, with easy-to-use and actionable… Continue reading Sonicwall Capture Client

The post Sonicwall Capture Client appeared first on MEC Networks Corporation.

]]>

Manage and Safeguard Endpoint Devices

captureclient min

SonicWall Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including next-generation malware protection and application vulnerability intelligence.

 

It leverages cloud sandbox file testing, comprehensive reporting, and enforcement for endpoint protection. Additionally, provide consistent assurance of client security, with easy-to-use and actionable intelligence and reporting.

How it Works

CC min

1. Pre-execution

Dynamic whitelisting/blacklisting and static protection

2. On Execution

Dynamic whitelisting/blacklisting and static protection

231128-1 min
Visualization min

3. Post-execution

Rollback, quarantine, and auto immunize

The Solution

468229-1 min

Endpoint Visibility

926854-1 min

Endpoint Management

339262-1 min

Advanced Threat Protection

861220-1 min

Vulnerable Applications Security

icons8-anonymous-mask-100 min

Malicious Web Act. Terminate

966928-1 min

Encrypted Traffic Inspection

sonicwall-onblack-logo-min

Browse SonicWall Security Solutions

The post Sonicwall Capture Client appeared first on MEC Networks Corporation.

]]>
Sonicwall Secure Mobile Access https://mec.ph/datasheet/sonicwall-secure-mobile-access/ Thu, 04 Jun 2020 23:23:13 +0000 https://mec.ph/?p=42243 INQUIRE NOW Download Resources Now Safeguard your work-from-home employees Deliver browser-based clientless secure access Get complete application access control using Per-App VPN Get high-performance layer-3 SSL VPN Gain visibility into every connecting device  Check integrity and health profile of the connecting device Browse SonicWall Security Solutions Click here

The post Sonicwall Secure Mobile Access appeared first on MEC Networks Corporation.

]]>

Safeguard your work-from-home employees

SonicWall-SMM-illustration min
icon-1 min

Deliver browser-based clientless secure access

icon-2 min

Get complete application access control using Per-App VPN

icon-3 min

Get high-performance layer-3 SSL VPN

icon-4 min

Gain visibility into every connecting device 

icon-5 min

Check integrity and health profile of the connecting device

sonicwall-onblack-logo-min

Browse SonicWall Security Solutions

The post Sonicwall Secure Mobile Access appeared first on MEC Networks Corporation.

]]>
Aruba Clearpass https://mec.ph/datasheet/aruba-clearpass/ Thu, 04 Jun 2020 20:05:46 +0000 https://mec.ph/?p=42136 INQUIRE NOW Download Resources Now Agentless policy control and automated response Aruba ClearPass is a policy management platform that a lot of businesses are implementing to effortlessly onboard new devices, grant varying access levels, and keep their networks secure. ClearPass allows you to securely connect business and private devices to your network in compliance together with your security policies. It allows you to grant full… Continue reading Aruba Clearpass

The post Aruba Clearpass appeared first on MEC Networks Corporation.

]]>

Agentless policy control and automated response

Aruba ClearPass is a policy management platform that a lot of businesses are implementing to effortlessly onboard new devices, grant varying access levels, and keep their networks secure.

 

ClearPass allows you to securely connect business and private devices to your network in compliance together with your security policies. It allows you to grant full or limited access to devices based on users’ roles, device type, and cybersecurity posture.

665166-0 min

Connect your guests and visitors to your office Wi-Fi with 3 Easy Steps.

ClearPass-NAC_Web-Page_Module-2_580x320 min
174501-0 min

Guest register and login via a captive portal.

633796-0 min

Confirm request for access.

242352-0 min

Guest receives a system-generated username and password.

aruba-allwhite-min

Browse Aruba Networks Solutions

The post Aruba Clearpass appeared first on MEC Networks Corporation.

]]>
Fortinet Mobile and Remote Public Service https://mec.ph/datasheet/fortinet-mobile-and-remote-public-service/ Thu, 04 Jun 2020 18:24:18 +0000 https://mec.ph/?p=42093 INQUIRE NOW Download Resources Now Secure Remote Access for Your Government Workforce at Scale Enabling Government Agencies with ICT Solutions for the New Normal Remote and Mobile Government Workforce Because the government may be incapable of sustaining normal operations onsite, they must be capable of supporting secure, remote connectivity to the network. Connect your Remote Agency… Continue reading Fortinet Mobile and Remote Public Service

The post Fortinet Mobile and Remote Public Service appeared first on MEC Networks Corporation.

]]>

Secure Remote Access
for Your Government Workforce at Scale

Enabling Government Agencies with ICT Solutions for the New Normal

bundle min

Remote and Mobile Government Workforce

Because the government may be incapable of sustaining normal operations onsite, they must be capable of supporting secure, remote connectivity to the network.

637901-0 min

Connect your Remote Agency by Deploying FortiWifi

637901-0 min

Wireless gateway combine with security benefits of FortiGate NGFW with a wireless access point

637901-0 min

Single-pane-of-glass visibility, configuration and monitoring

637901-0 min

Identify and confirm your users by adding a second layer of authentication process with FortiToken

The ability to securely support a remote workforce is an essential component of any government business continuity and disaster recovery plan.

 

The Fortinet Security Fabric takes advantage of a common Fortinet operating system and an open application programming interface (API) environment to create a broad, integrated, and automated security architecture.

Fortinet_white

Browse Fortinet Cybersecurity Solutions

The post Fortinet Mobile and Remote Public Service appeared first on MEC Networks Corporation.

]]>