Softprom Value Added Distributor





Have a perpetual license?

Move to subscription and save on the latest software of your choice.


Autodesk industry collections at 25% off - ideal if you need more than one Autodesk product

Get the most out of your favorite software. Industry collections combine leading products with specialized solutions to optimize your workflows so you can do more, faster, with greater confidence.

You can buy 1-year subscriptions or for 3-year subscriptions, please contact your Autodesk Reseller.


Save up to 25% on individual products

You can also trade in any eligible old licenses and trade up to the newest individual products of your choice.

AutoCAD®, AutoCAD LT®, Civil 3D®, Revit®, Inventor®, 3ds Max® and others.

Buy 1- or 3-year subscriptions from your Reseller


How do I get this offer?

Simply trade in your qualifying old perpetual license(s) and purchase a new 1- or 3-year subscription to any eligible collection or individual product of your choice.

Once you submit your perpetual license(s), you agree to discontinue use of the traded-in license(s).
This offer ends April 20, 2018.

Can I get a different product than I have now?

You do not need to purchase the same product as the perpetual trade-in license. For example, you can trade in an old, eligible perpetual license of AutoCAD and subscribe to a collection at the promotional price.


Contact us >>


Softprom by ERC and FireEye sign distribution agreement for the CIS market

Softprom by ERC, a Value Added Distributor today announced it has signed a distribution announcement with intelligence-led security company, FireEye. 

Under the agreement, Softprom by ERC is authorized to distribute all FireEye security products and solutions to partners in Azerbaijan, Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Tajikistan, Turkmenistan, Uzbekistan and Ukraine.


Softprom by ERC identified FireEye as a strong partner in the directions of cyber security and malware protection. FireEye's solutions provide security of data centre, industrial systems and critical infrastructure security, enterprise network security and endpoint security, as well as solutions for small and midsize businesses.


“Our target is to enhance the value added to our partners and provide the best security portfolio for solving key tasks customers of our partners. With FireEye, we strengthen our position as a value-added distributor of Security solutions,” said Paul Zhdanovych, managing director at Softprom by ERC.


High storage capacity NAS ideal for growing businesses

February 1, 2018 — Synology® Inc. launched RackStation RS2818RP+, a 3U 16-bay NAS providing large storage capacity with affordable total cost of ownership (TCO) for small-sized and medium-sized businesses.

High storage capacity NAS ideal for Growing Businesses


RS2818RP+ is Synology's first 3U RackStation NAS in the Plus Series product line, supporting up to 16 drive bays with up to 192TB raw capacity. The storage capacity can be further expanded up to 336TB when connecting to one RX1217(RP), providing on-the-fly volume expansion.

"One of the common challenges for modern small- and medium-sized businesses is finding a storage solution that can store large amounts of data while having the flexibility to scale when business grows," said Jason Fan, Product Manager at Synology Inc. "RS2818RP+ offers large storage capacity with affordable TCO. It is ideal to serve as a centralized backup target, a file server or a hub-and-spoke backup target for distributed businesses."


RS2818RP+ is powered by an Intel® Atom® C3538 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM, expandable up to 64GB with four 16GB ECC UDIMMs. The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs, providing over 1,400 MBps sequential read throughput and 26,000 random write IOPS.

RS2818RP+ can be purchased together with Synology's Extended Warranty (EW202) service, available in select regions worldwide, to provide up to 5 years of hardware warranty coverage.


RS2818RP+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications offered to enhance work productivity. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.


Protect your business! 7 tools of cybersecurity that entrepreneur needs

If you do not take proactive steps to protect the digital assets of your business, then you are definitely at risk. Approximately 43% of all cyberattacks, according to Symantec, are focused on small business - in part because they are large enough to be valuable, but also small enough to be vulnerable.

In addition, according to the National Alliance for Cybersecurity, 60 percent of small and medium-sized businesses that were hacked went out of business six months after cyberattacks.

Therefore, the conclusion suggests: enterprises that do not invest enough in their cybersecurity probably do not invest enough in other areas of their business. But statistics are still a concern, so if you want to protect your business, you need to make the investments and updates necessary for security.

The problem is that for an inexperienced entrepreneur or business without an official IT department, the world of cybersecurity is very confusing. Fortunately, you do not need to be a technical expert to make reasonable decisions regarding investment and protection. In fact, there are many tools that can protect you from the vast majority of potential attacks.

Here are some of the most important security tools that you will need for your business:

Password tools

According to Deloitte, your passwords are one of the biggest vulnerabilities in your business, with 90 percent of the passwords being weak enough and available for hacking. Choosing strong passwords, managing them effectively and changing them often are some of the best ways to prevent any cybercrime. The whole problem is where to store passwords securely. Therefore, a security tool such as Hideez Key can help. It stores up to 1000 passwords to your accounts in social networks, mail, cloud services, local applications. In order to enter the password, just press the button on the keyfob or the "hot key" on the keyboard.


You also need to use a virtual private network (VPN), which can encrypt all of your network traffic. The only network vulnerability is all that is required for an attacker to gain access to all your data, so invest in a tool such as Portnox Clear. The solution provides continuous monitoring of local and remote network devices, cloud environments regardless of the type of connection: wired, wireless, VPN.

Antivirus software 

You also need to invest in antivirus software for your devices. Antivirus software is not a reliable bet to protect you from hackers, but it will keep you up to date if your computer is infected with malware, and scans e-mail attachments to make sure they are not malicious. AVG Technologies offers free anti-virus software for individual users and special packages for businesses. In the market there is also McAfee and other options.


Invest in a firewall that will monitor incoming and outgoing traffic, filter out specific threats, and even block some sites altogether. The firewall will not protect you from all the threats on the Internet, but this is an additional level of insurance, which you should not refuse.

Better equipment

Old computers, servers and other hardware can be less expensive, but they create much more serious security risks. They tend to use older software and have security holes that are known and exploited for years. Make sure that you update your equipment regularly, every few years.

Better software (for all)

You will also need to pay close attention to what software and applications you use for tasks such as data storage, communication and project management. Each individual platform has its strengths and weaknesses, so choose vendors you trust with a long history of protecting customer data.


Finally, invest in training and awareness of your employees. Most hacks are explained by human mistakes, so more educated employees will be able to prevent them. Allocate time each month to check for updates, and remind your employees about the importance of habits, such as changing passwords regularly and avoiding suspicious links.

Stay alert!

Over the past 2 years, more than 14 million companies have been "hacked", but your business should not be next in line. While you make a reasonable investment, regularly monitor and improve the habits of your employees, and commit to stay abreast of the latest digital threats, you will significantly reduce your risks. Whatever you do, you have the right to protect your business from cyber threats.


EXCLUSIVE: Predictions in the field of cybersecurity from the CEO of Portnox

Blocking and hacking applications

Many believe that the blockade is not subject to hacking. But last year the number of attacks on applications based on block connections increased. Vulnerabilities do not arise from the block chain itself, but rather from applications that run on the block chain.

One of the most striking examples is Bitfinex hacking in August 2016, which resulted in the stolen bitcoin worth $ 60 million. Hacking was possible due to the fact that Bitfinex changed the encryption method, which makes it easier for hackers to access passwords and secret keys. Social engineering will be used more often to extract these secret keys, so the external development of the block chain is a risk, suggests Ofer Amitai, CEO and co-founder of Portnox.

DDoS ransomware

The creation of a new and more acute form of blackmail, DDoS and ransomware combine efforts to curtail progress in digital transformations that bring monetary benefits. These attacks are made possible by the use of botnets or large groups of "zombie" devices, which are often Internet of Things devices, such as web cameras, to redirect traffic to infected malicious web addresses, which in turn extract data from accessible endpoint and require redemption to return these encrypted data. One such example is the use of the Mirai botnet devices to activate inactive WannaCry viruses for reactivation due to the direction of their movement into the kill-switch domain.

These attacks are often called "failures" attacks, because DDoS traffic is directed to sites containing dangerous malicious programs. Thanks to the widespread adoption of Internet of Things devices at the enterprise and the increase in requirements for redemption, we are likely to see more of these attacks in the next year. The trend is heightened by the popularity of crypto conversions that an anonymous payment system has made available to hackers so that they can demand more and extend their foreclosure activities.

Workflow mobility

One of the clear trends for 2018 is to increase the mobility of the work process. With a large number of employees working remotely, organizations significantly reduce their capital costs (many even abandoned the physical office space) while simultaneously channeling operating costs to digital transformation trends, such as the cloud and BYOD.

The organization's mobility is good for the balance of companies, but the flexibility of technology makes cyber security vulnerable, which can serve as a gateway to hackers into the corporate network. Thus, companies that are tuned to mobile trends in the workflow will invest in more complex solutions for endpoints, networks and cloud solutions that protect access and assets in various locations and in various related environments.

Increasing IoT security regulation

The rules governing IoT security functions are already beginning to operate, but the demand from consumers is still low.

It is a serious question whether the US government or the EU will introduce security rules for IoT device manufacturers that protect consumers and companies from digital (and even physical) risk. Therefore, together with the GDPR and other organizations in 2018, we are likely to see more government and industry members (such as NIST) stepping up work to ensure compliance with the rules of confidentiality, general security and safety for IoT manufacturers. This can also lead to an increase in the cost of IoT devices.


Softprom by ERC signs Global Distribution Agreement with Imperva

Softprom by ERC, a value-added distributor, announced that they have signed a distribution agreement with Imperva, a cyber security leader that delivers solutions to protect data and applications in the cloud and on-premises. Softprom by ERC will offer Imperva solutions to partners in Azerbaijan, Belarus, Georgia, Kazakhstan, Moldova, Tajikistan, Turkmenistan, Uzbekistan and certain regions of the Ukraine.


Softprom by ERC will proactively engage partners and help them to understand the benefits of best-in-class cyber security solutions from Imperva. Imperva has been recognized as a leader in web application firewall and DDoS mitigation reports from top analyst firms. 


"We are excited to work with Imperva as this crucial relationship helps us to expand and develop our Information Security division. Through this relationship, our in region partners have access to a winning combination of market leading cybersecurity solutions from Imperva and our outstanding services, training and sales support capabilities," said Alexander Georgiev, head of the security department at Softprom by ERC.


“Softprom by ERC is a leading CIS value-added distributor known for providing outstanding professional services in testing, training, installation, implementation and technical support. We’re excited to add them as a distributor and to help accelerate the strong growth and interest that we see in the region. Together we’ll work to help enterprises protect their business-critical data and applications,” said Piotr Kluczwajd, Imperva area vice president for Eastern Europe, Russia, CIS and Turkey.



About Imperva
Imperva® (NYSE:IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations.

The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. 


About Softprom by ERC
Softprom by ERC is a leading Value Added Distributor in the Eastern Europe and CIS markets to which trust more than 1000 partners. 

The company provides professional services in testing, training, installation, implementation and technical support.  At the moment, Softprom by ERC has more 40 distribution contracts with the world's largest vendors. 


Women in cybersecurity: scholarship program launched

The ISC Cybersecurity Scolarship Program is implemented by the Cybersecurity and Education Center. With the global labor shortage in cybersecurity and the lack of representation of women in this field (only 10%), this program was created in order to attract more women to cybersecurity. In total, ISC and the Center for Cybersecurity and Education have allocated more than $ 1 million in cybersecurity scholarships.

"By this program, we want to inspire more women to build an interesting career in cybersecurity," said Patrick Craven, director of the Center for Security and Education in Cybernetics. "I look forward to rewarding worthy students with the financial help they need to realize their dreams."

The Center evaluates candidates based on academic excellence, passion for the industry and financial needs. Since 2011, the Women's Scolarship Program (ISC) had a positive impact:

"It was such an honor for me to receive this scholarship," said Ai Nguyen (USA). "This reduced the financial burden on my parents, and also allowed me to work less and have more time to focus on studying security. Getting this scholarship makes me believe that my hard work has really paid off, and there are so many people who still care about students, especially about women's education and success. I will definitely try my best to apply what I got, and spend all my time on the computer science community. "

"I am extremely grateful to ISC and the Cybersecurity and Education Center for choosing me for this prestigious scholarship," said Aventika Ramesh (USA). "My classes would not be possible without the generous support of fellows, such as ISC and the Center for Cybersecurity and Education."

"Being in the information security community for more than four years, I have always followed events and seminars around the world," said Mudita Khurana (India). "I am very grateful to them for giving me the opportunity to expand my knowledge in information security."

For more information about the ISC scholarship program, look to the page.


The companies will take serious measures to solve the problem of cyber-risk

As cyberattacks increasingly threaten all aspects of the business and grow in size and scope, companies will have to take new measures to solve the cyber security problem in a comprehensive manner, integrating it more aggressively into managing their enterprise risks, according to Aon's Cyber ​​Solutions specialists. The report describes a number of specific actions that, according to Aon, companies will take in 2018 to address cyber threats, as well as other cyber-trends that are expected this year.

"In 2017, cyber-attackers created chaos through a series of levers, from phishing attacks that affected political campaigns and crypto systems with extortion that penetrated operating systems globally. With the growth of the Internet of Things, we have also witnessed attacks on devices that have damaged the functionality of the device," said Jason J. Hogg, CEO of Aon Cyber ​​Solutions.

"In 2018, we expect increased cyber impact due to the convergence of three trends: firstly, the growing dependence of companies on technology, and secondly, the strengthening of the regulatory agencies' orientation to protect these consumers, and third, the growth in the value of non-physical assets. Impact will require an integrated approach to cybersecurity for both business culture and risk management. Leaders must adopt a coordinated approach based on cyber risk management, allowing them to better assess and mitigate risks in all corporate functions. "

The forecasts for 2018 indicate an increase in the scale and impact of cyberattacks, which means that companies will be forced to take more responsibility and monitor information security.

The full version of the article is available by the link.


TrapX Security Named as the Technology Leader in the Deception-based Cyber-security

Frost & Sullivan’s global team of analysts and consultants continuously research a wide range of markets across multiple sectors and geographies. As part of this ongoing research, they identified companies that consistently invest in new technologies, allowing them to carve out a unique and defensible position within their industries.

This involves extensive primary and secondary research across the entire value chain of specific products and/or technologies.

Against the backdrop of this research, Frost & Sullivan has recognized TrapX Security as the Technology Leader in the Deception-based Cyber-security Defense for Manufacturing industry.


TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.

Softprom by ERC is the official distributor of TrapX Security in the CIS countries and Europe.



Now, Rhino users can create photorealistic imagery quickly and easily.

We’ve incorporated powerful V-Ray tech, such as GPU and hybrid rendering, adaptive lights and improved denoising. And, with full VRscans support, you can enhance your projects with our library of over 600 lifelike materials.


Join us on February 13 for a special webinar on the new features of V-Ray 3.6 for Rhino. We’ll show you how it can help you hit deadlines and win clients.

Register for the webinar.


Here’s what’s new in V-Ray 3.6 for Rhino:

Faster, more powerful GPU rendering adds support for on-demand mip-mapping, aerial perspective, displacement, subsurface scattering, matte/shadows, and more.

V-Ray GPU running on NVIDIA CUDA can now take full advantage of all available hardware, including both GPUs and CPUs.

In scenes with many lights, the new Adaptive Lights mode can help you speed up render times by up to 700%.

The entire V-Ray for Rhino interface has been updated and streamlined for a more intuitive, user-friendly workflow.

Chaos Group's seamless cloud rendering service debuts in V-Ray 3.6 for Rhino. To be among the first to try it, click the cloud rendering button in V-Ray for Rhino, or register at


And loads more! Discover what's new in V-Ray 3.6 for Rhino.



Top-5 advices from Fire Eye Five Practical Ways for Executives to Manage Cyber Threats

According to the World Economic Forum, cyber security is at the top of the list when it comes to major issues facing the world in 2018. The increasing number and severity of nation-state attacks on industrial control systems in 2017 only underscored the situation.

FireEye and Marsh & McLennan discuss the latest challenges posed by cyber threats, including potential personal and financial impacts to executives as well as GDPR and other cyber laws that may affect the threat landscape.

The report includes five ways corporate leaders might improve their cyber defenses:

1) Cloud-based operations
2) Patching
3) Security awareness
4) Government-corporate collaboration
5) Planning

Full version of report from Fire Eye you will find by the link.


Introducing the security center for G Suite—security analytics and best practices from Google

Make it easy!

You and your admins can access a bird’s eye view of your security—and, more importantly, that you can take action based on timely insights.


introducing the security center for G Suite, a tool that brings together security analytics, actionable insights and best practice recommendations from Google to empower you to protect your organization, data and users.

With the security center, key executives and admins can do things like:
  1. See a snapshot of important security metrics in one place.
    Get insights into suspicious device activity, visibility into how spam and malware are targeting users within your organization and metrics to demonstrate security effectiveness—all in a unified dashboard.
  2. Stay ahead of potential threats.
    Admins can now examine security analytics to flag threats. For example, your team can have visibility into which users are being targeted by phishing so that you can head off potential attacks, or when Google Drive files trigger DLP rules, you have a heads up to avoid risking data exfiltration.
  3. Reduce risk by adopting security health recommendations.
    Security health analyzes your existing security posture and gives you customized advice to secure your users and data. These recommendations cover issues ranging from how your data is stored, to how your files are shared, as well as recommendations on mobility and communications settings.


Get started

More than 3.5 million organizations rely on G Suite to collaborate securely.

  • If you’re a G Suite Enterprise customer, you’ll be able to access the security center within the Admin console automatically in the next few days. These instructions can help admins get started and here are some security best practices to keep in mind.
  • If you’re new to G Suite,
    learn more about about how you can collaborate, store and communicate securely.



Fire Eye is going for APAC market

Cyber-threat is a process that is present in our life constantly and sharply catches unawares. Worldwide, cyber dependency is growing with the increase in the number of digital media that are interconnected with people, devices and organizations.

Today we will talk about the Asia-Pacific region.
Without knowing the boundaries, cyber incidents, fraud and thefts that afflict North America or the European continent have spread to the APAC, bringing significant financial losses, identity theft and the failure of large companies. They combine threats for information infrastructure and network disruptions. The international business suffers the most from cyber attacks, therefore, in addition to the main financial tasks, companies are recommended for special attention to the protection of information.

Financial services, energy and utilities, as well as telecommunications, are among the most vulnerable in the Asia-Pacific region, underscoring the urgent need to raise awareness and apply measures in the field of cybersecurity.

Cyber problems in the APAC, such as insufficient funding for cybersecurity and ignorance of cyber attacks, are associated with a complex of geopolitical situation, a critical infrastructure condition and an acute shortage of information security specialists.

Fortunately, the regulatory climate in the APAC varies slowly, but in the right direction. Today, countries in the region are not required to legally report any cyber incidents, and many are doing so, but Singapore and Australia have already developed a plan for compulsory reports of cyber-security violations in 2018.

Reliable cyber advisers, FireEye and Marsh & McLennan Companies - every leader in their field - have today come together to help organizations in the Asia-Pacific and strengthen their corporate cyber-resistance.
To sum it up, we understand that the earlier government members and businesses realize the current risk from cyber attacks, then faster they can take important steps to protect information.



Google adding Braille support in Google Sheets, and screen magnifier support in Google Slides and Drawings

Google launching new features for Google Sheets, Slides, and Drawings.

Specifically, Google adding Braille support in Google Sheets, and screen magnifier support in Google Slides and Drawings.


Use Google Sheets with Braille displays

You can already use Braille displays to read and edit text in Docs, Slides and Drawings. Now we’re adding Braille support to Sheets as well. You’ll be able to use a Braille display to read and edit cell contents as well as navigate between cells in a sheet. At the moment, Braille support in Sheets will only be available on Chrome OS with the ChromeVox screen reader. We’re working to add support for other platforms and screen readers.


Use screen magnifiers with Google Slides and Drawings

We recently added screen magnifier support to Docs and Sheets. Now screen magnifiers will also work with Slides and Drawings. You can use screen magnifiers with Docs, Sheets, Slides, and Drawings on Mac and Chrome OS devices.


Available to all G Suite editions


Synology Introduces RackStation RS818+/RS818RP+ and Expansion Unit RX418

Synology Inc. launched RackStation RS818+/RS818RP+ and expansion unit RX418, a 1U 4-bay rackmount NAS designed with speedy transmission performance and storage scalability for small- and medium-sized businesses.


RS818+/RS818RP+ features a 2.4GHz quad-core processor with AES-NI encryption engine, 2GB DDR3 memory (expandable to 16GB in dual channel), and a PCIe 2.0 slot to support an optional 10GbE network card.

This powerful hardware provides a reading speed exceeding 1,099 MB/s, making RS818+/RS818RP+ ideal centralized storage for multi-client data transmissions.

The storage capacity of RS818+/RS818RP+ can be further expanded with Synology expansion unit RX418, providing up to 8 drives for flexible data management and backup. RS818+/RS818RP+ comes with four 1GbE LAN ports to support Link Aggregation and failover. Synology High Availability support provides a reliable active/passive server cluster, keeping data and services online. 

Furthermore, RS818RP+ is equipped with redundant power supplies to deliver increased service continuity.


"Condensed in a flat 1U rackmount chassis, RS818+/RS818RP+ provides great performance, hardware upgradability, and service reliability," said Michael Wang, Product Manager at Synology Inc.


RS818+/RS818RP+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications such as file sharing, data backup, or collaboration tools to enhance work productivity.

Certified by VMware®, Citrix®, Microsoft Hyper-V®, and OpenStack Cinder®, RS818+/RS818RP+ can be seamlessly integrated into a company's virtualization environment.


Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PCMag Readers' Choice Award seven years in a row.


Barracuda has developed a cloud-based network security solution

Barracuda Cloud Generation is reviewing the role of the firewall from a perimeter security solution in a distributed network optimization solution that scales in any number of locations and applications, connects to local and cloud infrastructures, and helps organizations transform their business.

Barracuda NextGen Firewall F-Series is a series of hardware, virtual and cloud devices designed to protect the company's distributed network infrastructure. F-Series firewalls with cloud-based support improve the interaction between sites and provide continuous access to applications located in the cloud and simplify the administration of network operations for enterprises and managed service providers.

The Barracuda NextGen Firewall F-series achieves this by tightly integrating the full suite of next-generation firewall technologies, including layer 7 application profiling, intrusion prevention, website filtering, malware and advanced treatment detection, antispam and network access control. In addition to these next-generation firewall features, highly reliable VPN technology combined with intelligent traffic management and WAN optimization capabilities, allows customers to save line costs and increase overall network availability.

F-Series firewalls with a cloud-based design are ideal for multi-site enterprises, managed service providers and other organizations with an integrated, distributed network infrastructure.

Softprom by ERC - the official distributor of Barracuda Networks, Inc. on the territory of the CIS countries and Russia.


Netsparker and Softprom by ERC announced the signing of a global distribution contract

January, 2018 - Netsparker, the manufacturer of the world's known web vulnerability scanner, and Softprom by ERC, the largest Value Added Distributor in the CIS and Russia, announced the signing of a global distribution contract.
According to this agreement, Softprom by ERC becomes the official distributor of the world-known solution for the detection of web vulnerabilities - Netsparker. Distribution and promotion of this solution, Softprom by ERC will implement on the territory of the CIS countries and Russia.
Netsparker is the only product of the company Netsparker, and forms the basis of the company's activities, in this regard, receives maximum attention and continues to establish innovative standards in its field.
The Netsparker solution exists in two versions - cloud and desktop, and is designed to detect web vulnerabilities and errors in the settings of Web servers, search for XSS vulnerabilities and SQL injection. In addition to the vulnerability search, the web scanner analyzes the structure of the website for the disclosure of service information, such as data backups, debugging web scripts, hidden directories, etc.
As Pavel Zhdanovich noted, the director of the group of companies Softprom by ERC, the automated solution of the scanning process and receiving recommendations for the removal of vulnerabilities, perfectly complements the Web Application Firewall solutions that are presented in the Softprom by ERC security portfolio for different market segments.
In turn, Bogdan Tobol, director of the regional sales department at Netsparker Web Application Security, commented on the signing of this contract: "Our cooperation will bring great benefits to the Eastern European market, and we are confident that through working with Softprom by ERC we will be able to expand the partner channel in this region. "

About Netsparker

Netsparker Ltd is a mature and well-known British company specializing exclusively in the development of automated web security scanners, mainly web security scanners Netsparker Desktop and Netsparker Cloud. Netsparker's management and engineers have more than 20 years of experience in the security industry of web applications, which affects their products.
The Netsparker solution was developed in 2009 and is now used by world-renowned companies such as Samsung, NASA, Microsoft, ING bank, Skype and Ernst & Young.

About Softprom by ERC

Softprom by ERC is the leading Value Added Distributor in the CIS and Eastern Europe, which is trusted by more than 1000 partners.
Softprom by ERC was founded in 1999 and today it is represented on the territory of Azerbaijan, Belarus, Georgia, Kazakhstan, Moldova, Russia, Ukraine and Poland.
The company provides professional services for testing, training, installation, implementation and technical support. At present, Softprom's portfolio includes more than 40 distribution contracts, from the world's largest manufacturers.


Portnox experts talk about the importance of the NAC solution

This article presents the reasons why a valuable offer of Network Access Control (NAC) solutions in recent years has changed due to the emergence of wireless networks in combination with technological advancement that led to the introduction of BYOD and IoT devices into the enterprise.



The growing demand for NAC solutions. 

Since in the early 2000s, for the first time, access control for the network (NAC) was put in place, much has changed in the field of enterprise security. If companies used only desktop computers and laptops connected and authenticated over a wired network, now wireless networks and mobile technologies have implemented personal devices (via BYOD) and Internet of Things (IoT) at the workplace. In addition, increasingly stringent compliance standards, such as the PCI-DSS, SOX and ISO standards, require companies to publicly report their security controls to external audit authorities. As a result, the demand for NAC solutions has grown rapidly in recent years: Research and Markets predicts that by 2022 the NAC market will cost $ 4.39 billion. However, the cost of NAC solutions goes far beyond the response to specific problems with devices, network and compliance.
NAC solutions can effectively respond to the "First 5 CIS controls" or to the high security requirements recommended by government and private security research organizations that can eliminate approximately 85% of organizational security vulnerabilities. When implemented with an existing security infrastructure such as SIEM, IPS, MDM, and others, NAC solutions can provide an effective intelligence that simplifies the response to changes in the network. These benefits and much more are outlined below, explaining why now, more than ever, corporate networks need to put NAC on the priority list when it comes to securing the organizational network.
Those who are familiar with the market for cybersecurity providers know that because of the spread of solutions, many organizations are overwhelmed by what is known as the "Fog of the Greater", or a constant stream of new information and problems that they need to address. As a result, the Internet Security Center (CIS) has developed a list of the best management elements to help organizations focus their cybersecurity needs and choose solutions that will take into account the greatest number of vulnerabilities.

While specific solutions are not mentioned, NAC refers to most of the 20 controls and provides full coverage of critical TOP-5, namely:

Control CIS 1: Inventory of Authorized and Unauthorized Devices
Control CIS 2: Inventory of Authorized and Unauthorized Software
Control CIS 3 monitoring: secure configurations for hardware and software
Control CIS 4: Continuous assessment and removal of vulnerabilities
Management of CIS 5: Controlled use of administrative privileges


Features and benefits of NAC solutions. 

  • Visibility in the network: NAC solutions are a "universal store" when it comes to getting the visibility of connected devices on the network and providing network management tools.
  • Access control: At the core of any NAC solution is the ability to control access to the organizational network.
  • Unified management. By providing the ability to see and control devices connecting to the network, NAC solutions offer a single management console that simplifies key tasks for network administrators and security administrators.
  • Internet of Things addresses: NAC eliminates security issues, allowing you to see the visibility of IoT in a system without an agent. He can see when IoT devices connect and transfer data over the network, and monitor the network areas to which they can access.
  • Integration with existing infrastructure: NAC solutions can use warnings from integrated systems to formulate better responses to threats or network state changes. They also integrate with user-defined repositories, such as Active Directory, to manage network access based on Group Policy, ensuring that users only have access that they need.
  • Achieving compliance: NAC solutions in particular can help organizations meet growing compliance standards in many industries, such as PCI-DSS, SOX, HIPAA, ISO 27002 and NIST.

10 years ago, the conversation around the NAC solutions was focused on managing wired networks, laptops and desktop devices in the enterprise, and today the valuable offer of NAC solutions has increased noticeably. Due to the proliferation of wireless networks and mobile devices - through BYOD and IoT - the workplace has, on the one hand, a more flexible environment, and on the other - increased vulnerabilities and cyber-risk. Since the NAC solutions deal with the "first 5 CIS controls", and also provide intelligence in network behavior through various integration and compliance methods, they are well suited to help solve these problems.
Thus, by controlling access to the network using the NAC solution, organizations monitor their impact on a wide range of emerging digital business risks, keeping their organizational network healthy and safe.


Softprom by ERC - the official distributor of Portnox

Send your inquiry