StarLink signs as Solera distributor in GCC region
Distributor to supply network forensics, security intelligence and analytics solutions
StarLink, a specialist security solutions value-added-distributor, has signed an agreement to distribute Solera Networks solutions.
Under the accord, StarLink will supply network forensics, security intelligence and analytics solutions to channel partners in the GCC region.
"With the ever-growing security gap in the defensive capabilities of traditional network forensics tools, the landscape is rife with new digital threats, which drove us to partner with the next generation in security intelligence solutions, Solera Networks," said Nidal Othman, managing director at StarLink. "Solera's DeepSee technology provides swift, intelligent remediation of security events, which is critical to protecting any organisation from further exposure and risk."
Chris Brown, regional sales director EMEA, Solera Networks, said: "We believe that StarLink is the ideal organisation to distribute Solera Networks' big data security solutions in the GCC region."
Brown said with Solera's comprehensive security intelligence, real-time analytics and advanced threat protection, enterprises in the Middle East will now quickly and easily have the answers to difficult post-breach questions like ‘who hacked us?', ‘how did they do it?', ‘what data was compromised?' and ‘are we sure they are not still in our network?'
Steve Shillingford, president and CEO of Solera Networks, added that enterprises are losing the battle against targeted attacks and, as a result, intellectual property is being stolen and networks are successfully breached every day because these threats go undetected. "Organisations are now realisng that their traditional, prevention-based technologies are not fully protecting their systems and data, and are shifting their cybersecurity focus toward breach preparedness," he said.
Shillingford pointed out that Solera's solutions level the battlefield and hasten this shift by recording and classifying every packet, file, and flow going in and out of the network for complete reconstruction of any attack.