sb-au logo
Story image

Channel guru brings Bufferzone to A/NZ

27 May 2020

Technology entrepreneur Greg Wyman has launched the Australia and New Zealand operation of Bufferzone Security, a provider of endpoint security solutions.

Previously, Wyman brought Backup Exec/Veritas, Brocade and StorageCraft to the region and now is hoping to add another brand to his list of success stories.

Bufferzone’s A/NZ business will augment operations in the US, Europe, Japan, South Asia, Africa and Israel. 

The company protects organisations from advanced threats including ransomware, zero-day attacks and phishing scams.

“We are proud to work with Greg and his A51 team and introducing an MSP (Managed Service Provider) model for our technology. We believe Australia and New Zealand are perfect for the initial launch of this program due their size, culture and vast number of SMB businesses,” says Bufferzone CEO Israel Levy

Bufferzone’s solution protects endpoints of all business sizes by creating a local, lightweight and secure virtual container on each user’s PC or laptop that prevents malware from escaping to infect the corporate network.

“According to Verizon in 2019, 94% of data breaches start with email and/or the web. Using Bufferzone, whenever a user clicks a web link, visits a website, downloads a file from the web or opens an email attachment, it is opened in a lightweight, secure virtual container located on the user’s PC or laptop,” Wyman says.

“Malware can’t escape from that container, so the user’s PC/laptop is protected and malware is prevented from compromising the corporate network, even with remote workers. Our ethos is ‘we know you can’t detect all threats, but you can contain them’.

“We are an ideal complement to existing security products. We are able to deliver an exceptional level of protection of endpoints and prevention of network infections as a powerful, reliable and affordable complement to all security strategies.”

Bufferzone endpoint security solutions protect enterprises from advanced threats including ransomware, zero-days, phishing scams and APTs. 

With containment, bridging and intelligence capabilities, it gives employees access to internet applications; mail and messaging applications such as Zoom, Teams, Whatsapp, Line and WeChat; network folders; and removable storage without putting an organisation's core systems.

Bufferzone recently announced the availability of BUFFERZONE WFH (Work From Home) package, allowing its customers to securely access corporate resources on all Windows PCs, including home Windows PCs.

It assumes that the home PC is not secure, not managed, and should not retain corporate data. It will not allow access to the content in the contained session from outside of the container, keeping corporate data safe. 

Link image
Get real: AI and its business impact under the spotlight
In a world overrun with hype, you need to find real solutions that drive real business impact, and real results for customers.More
Link image
Network on TAP: Visibility made easy
Test Access Points (TAPS) connect to cabling infrastructure to conduct packet monitoring – and they’re the most effective way to copy traffic across a system. Put this tried-and-true visibility device to work for you today.More
Story image
Fortinet resolves to help communities through new Corporate Foundation
“Through the establishment of a Corporate Foundation, we are extending investments in security training and education, employee community engagement and disaster relief efforts to empower and protect our communities, as well as positively impact our business, employees, customers and shareholders.”More
Story image
Attivo Networks partners with Zirilio to bolster managed detection
As part of the partnership, the two companies will integrate their solutions to combat the new cybersecurity challenges that have risen as COVID-19 keeps people working and learning from home.More
Story image
54% rise in gaming-related cyber attacks recorded in April
Social isolation measures, widely implemented throughout the world during March and April, has been linked to both the increase in engagement for gaming and a corresponding boom in game-related cyber attacks.More
Link image
In detection & response, you can’t afford to get it wrong
Packet captures or metadata – which is the better choice? Only one offers clear advantages.More