• Home
  • Resellers
    • VAR & SI Channel
    • Cloud Channel
    • Retail Channel
    • Service Provider Channel
    • Become a Partner/ Reseller
    • Events/ Workshops/ Siminars
  • End User
    • Look for a Reseller/ How to buy?
  • Products & Services
    • Products by Vendors >
      • Dell Technologies
      • Hewlett Packard Enterprise (HPE)
      • Aruba Networks >
        • Aruba's Solutions
      • COMMSCOPE
      • F5
      • FLUKE networks
      • tenable network security
      • Extreme Networks
      • Veritas
      • RITTAL
      • FireEye
      • LogRhythm
      • RUCKUS Wireless >
        • Ruckus solutions
      • technicolor
      • Sentinel One
      • Mandiant
      • APC
      • PANDUIT
      • LINKSYS Networks
      • Lenovo
      • Honeywell Mobility
      • Netscout
      • Nexthink
      • NEC Display
      • STC Cloud
      • Acronis
      • Skybox Security
      • Logitech Video Conferencing
      • LogRhythm
      • GATEWATCHER
    • Product by BU Solutions >
      • Data Centers >
        • HPE Compute and Data Storage
        • Lenovo Data Center Group
        • VMware
        • F5
        • Pivot3
        • Veritas
      • Cloud & Digital Distribution BU
      • Cyber Security & Data Protection >
        • F5
        • Tenable
        • FireEye
        • RUCKUS Enterprise Networking >
          • DELL EMC
        • Mandiant
        • LINKSYS SMB Networking
        • Sentinel One
        • Arbor Networks
        • Veritas
        • GATEWATCHER
        • Skybox Security
        • Acronis
        • Boolebox
      • Infrastructure & Networks >
        • Aruba Networks
        • Extreme Networks
        • F5
        • DELL Networking
        • SYSTIMAX® Structured Cabling
        • NETCONNECT® Structured Cabling
        • PANDUIT
        • APC
        • Rittal
      • Collaboration, Wireless & Mobility >
        • Logitech Video Conferencing
        • Zoom
        • NEC Display
        • NETSCOUT
        • Zoho Cliq Collaboration
        • Aruba Wireless
        • Team Viewer
        • PRTG Network Monitor
        • Ruckus Wireless
        • Extreme Wireless & Mobility
        • LINKSYS Wireless for SMB
        • Cradlepoint 4G/5G
        • Honeywell productivity & Mobility
      • IT Support & Test Systems >
        • Nexthink
        • Zoho IT & Help Desk
        • Fluke Networks
        • spirent
      • Retail and Consumer BU
      • IoT, Internet & Connectivity BU
    • Cloud Solutions
    • Professional Services
    • Support >
      • Escalation Procedure
      • RMA & After Sales
      • Downloads
      • VAD Technologies
      • Knowledge Center
      • Forum
    • Product Information >
      • Dell EMC smart value promotion
      • Dell EMC PowerScale
      • HPE Storage
      • Aruba SMB Networking
  • Marketplace
  • Company
    • About Us
    • News
    • Events Gallery
    • Vendor Partners
    • Awards
    • Join us
    • Contact
AlJammaz Technologies
The Leading Value-Added Distributor

ترجمة بالعربية لتغطية سيسكو تالوس لـ واناكراي  Arabization for Cisco Talos coverage for WannaCry

16/5/2017

0 Comments

 
Picture
A major ransomware attack has affected many organizations across the world reportedly including Telefonica in Spain, the National Health Service in the UK, and FedEx in the US. The malware responsible for this attack is a ransomware variant known as 'WannaCry'.
The malware then has the capability to scan heavily over TCP port 445 (Server Message Block/SMB), spreading similar to a worm, compromising hosts, encrypting files stored on them then demanding a ransom payment in the form of Bitcoin. It is important to note that this is not a threat that simply scans internal ranges to identify where to spread, it is also capable of spreading based on vulnerabilities it finds in other externally facing hosts across the internet.
لقد أثر هجوم الفديه الكبير واناكراي  على العديد من المنظمات في جميع أنحاء العالم بما في ذلك تلوفونيكا في إسبانيا، وخدمة الصحة الوطنية في المملكة المتحدة، و فيداكس في الولايات المتحدة. البرمجيه الخبيثة المسؤولة عن هذا الهجوم كانت هجوم الفديه البديل المعروف باسم واناكراي
البرمجيه الخبيثة "واناكراي" كان لديها القدرة على مسح المنفذ تي سي بي 445  بشكل كبير وهو المسؤول عن (خادم حجب الرسائل اس ام بي). "واناكري" انتشر بشكل مماثل لطريقه انتشار الدوده وورم، انتهك اجهزه المضيفين، شفر الملفات المخزنة على هذه الاجهزه ثم طالب بدفع فدية ماليه على شكل بت كوين (العملة الرقمية التي يمكن التداول بها في المعاملات دون الحاجة إلى البنك المركزي). من المهم أن نلاحظ أن هذه البرمجيه الخبيثه ليست ببساطة تهديدا يقوم بمسح النطاقات الداخلية لتحديد المكان التي ستنتشر بها فقط، بل هو أيضا قادرة على نشر نفسه من خلال نقاط الضعف او الثغرات التي يجدها على اجهزه المضيفين التي يتمكن من الوصول اليها في النطاقات الخارجيه عبر الإنترنت

Read More
0 Comments

اهمية عمل النسخ الاحتياطي الجيد لضمان الاصول و البيانات الخاصة بك وامكانية استعادتها بسرعة للحماية من هجمات البرامج الخبيثة  The Importance of Data

26/2/2017

0 Comments

 
Picture

The Importance of Data Backup and Recovery to protect organizations from destructive malware

Recent Shamoon 2 activity serves as a good reminder that users and organizations need to have a comprehensive disaster recovery plan.

اهمية عمل النسخ الاحتياطي الجيد لضمان الاصول و البيانات الخاصة بك وامكانية استعادتها بسرعة للحماية من هجمات البرامج الخبيثة ​

تعتبر الاحداث الاخيرة لشمعون 2 بمثابة منبه حقيقي للمستخدمين و المنظمات عن ضرورة وجود خطة شاملة من الكوارث لحماية البيانات و استرجاعها باسرع وقت في حالة حدوث كوارث مشابهة

Read More
0 Comments

ترجمة بالعربية لتغطية سيسكو لشمعون 2  Arabization forCisco Coverage for Shamoon 2

15/2/2017

0 Comments

 
Picture
By AlJammaz Cyber security BU

Cisco Coverage for Shamoon 2

​Shamoon is a type of destructive malware that has been previously associated with attacks against the Saudi Arabian energy sector we've been tracking since 2012. We've observed that a variant of Shamoon, identified as Shamoon 2, has recently been used against several compromised organizations and institutions. Talos is aware of the recent increase in Shamoon 2 activity and has responded to ensure our customers are protected. Additionally, Talos will continue to monitor for new developments to ensure our customers remain protected

تغطية سيسكو لشمعون 2

شمعون هو نوع من البرمجيات الخبيثة المدمره و الذي ارتبط سابقا مع هجمات ضد قطاع الطاقة في المملكة العربية السعودية والذي كنا نتتبعه منذ عام 2012. ولقد لاحظنا نوع مطور جديد من شمعون ويدعى شمعون 2 استخدم مؤخرا في هجمات ضد عدد من المنظمات و المؤسسات. تالوس على اطلاع بوجود زيادة في نشاط شمعون 2 في الفترة الأخيرة واستجابت لضمان حماية عملائنا. بالإضافة إلى ذلك، سوف تستمر تالوس في مراقبة اي تطورات جديدة لنضمن لعملائنا الحماية​

Read More
0 Comments

WhiteHat Security Sentinel Dynamic, Find and fix vulnerabilities before the bad guys can exploit them (DAST)

5/5/2016

0 Comments

 
Picture
Software Applications are at the core of every business. Today’s organizations deploy a myriad of web applications, ranging from external-facing corporate websites to internal-facing portals.
WhiteHat Sentinel Dynamic is a Software-as-a-Service platform that enables your business to quickly deploy a scalable web application security program. No matter how many websites or how often they are updated, Sentinel Dynamic can scale to meet any demand.

Read More
0 Comments

Cisco Advanced Malware Protection for Networks

23/4/2016

0 Comments

 
Picture

Protect your network from malware

Get the market's only network-based malware defense that goes beyond point-in-time detection to protect across the entire attack continuum. Designed for our network security appliances, specifically the Next-Generation Intrusion Prevention System (NGIPS), AMP for Networks provides visibility and control to protect against highly sophisticated and targeted advanced malware.

Read More
0 Comments

    AlJammaz Distribution
    Knowledge Center

    Archives

    May 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    September 2021
    October 2020
    August 2020
    July 2020
    June 2020
    January 2020
    May 2019
    February 2019
    January 2019
    October 2018
    September 2018
    July 2018
    March 2018
    May 2017
    February 2017
    September 2016
    July 2016
    May 2016
    April 2016
    March 2016
    February 2016

    Categories

    All
    Collaboration & IP Telephony
    Consumer
    Data Centers & Cloud
    Enterprise
    Home Networking
    Security
    SMBs
    Software As A Service
    Software-as-a-Service
    Wireless LAN

    RSS Feed

Channels


System Integrators & VAR
​Cloud Resellers
Retailers
Service Providers
End User

Services


Supports
Downloads
Professional Services
Events & Workshops
Events Gallery


Company


About us
News
Contact us
Join us
Escalation Procedure

Compliance & Ethics

Direct Number:  920 000 230

Copyright © AlJammaz Technologies. All rights reserved
Privacy Policy
member of AlJammaz Group of companies