NSFOCUS has moved into Australia and says it is ‘uniquely placed’ to protect against cyber attacks from China.
China has been associated with up to 40% of global cyber attacks - and it even seems like those attacks can take days or even months to replicate elsewhere.
These statistics have formed the basis of NSFOCUS’ security offering, which uses insight from inside China and other countries to help customers improve their own security strategies.
The company uses more than 12,000 network sensors, honeypot networks, 700Gb of daily data collection and visibility into 400 million endpoints.
“The launch of NSFOCUS into Australia is a natural extension of our progress across Asia Pacific. Australia has a mature information technology market, with a rich depth of IT expertise that includes cyber security professionals, yet corporates and governments are still falling prey to cyber-attacks,” explains Attley Ng, senior vice president Asia Pacific at NSFOCUS.
Ng believes that NSFOCUS Global Threat Intelligence will deliver strategic and tactical intelligence for a complete view of the threat landscape.
“Implementing a holistic, intelligence-driven solution with true global insight can help security teams to understand strategic and tactical intelligence – not just feed data - to take immediate action on the threats to their business. Our worldwide team of researchers and engineers work around the clock to help customers gain visibility and threat context to effectively respond to threats, both known and unknown,” he says.
The company has chosen Aquion as its Authorised Value Distributor to support the Australian market and security channel partners. Aquion managing director Stephen Balicki says the partnership presents ‘exceptional’ opportunities for data security.
“These will appeal to channel partners and reinforce our AqSEC business unit which helps customers to monitor, manage and secure all elements of enterprise infrastructure using the best technologies,” Balicki says.
The NSFOCUS suite of Threat Intelligence includes: