• Home
  • Resellers
    • VAR & SI Channel
    • Cloud Channel
    • Retail Channel
    • Service Provider Channel
    • Become a Partner/ Reseller
    • Events/ Workshops/ Siminars
  • End User
    • Look for a Reseller/ How to buy?
  • Products & Services
    • Products by Vendors >
      • Dell Technologies
      • Hewlett Packard Enterprise (HPE)
      • Aruba Networks
      • Extreme Networks
      • Veritas
      • COMMSCOPE
      • F5
      • FireEye
      • LogRhythm
      • Pivot3
      • RUCKUS Wireless
      • Sentinel One
      • APC
      • PANDUIT
      • RITTAL
      • LINKSYS Networks
      • technicolor
      • Lenovo
      • FLUKE networks
      • Honeywell Mobility
      • tenable network security
      • WhiteHat SECURITY
      • Netscout
      • Nexthink
      • NEC Display
      • STC Cloud
    • Product by BU Solutions >
      • Data Centers >
        • DELL EMC
        • HPE Compute and Data Storage
        • Lenovo Data Center Group
        • VMware
        • F5
        • Pivot3
        • Veritas
      • Cloud & Digital Distribution BU
      • Cyber Security & Data Protection >
        • Tenable
        • FireEye
        • F5
        • LogRhythm
        • Sentinel One
        • Arbor Networks
        • Veritas
        • Boolebox
      • Infrastructure & Networks >
        • Aruba Networks
        • Extreme Networks
        • F5
        • RUCKUS Enterprise Networking
        • DELL Networking
        • LINKSYS SMB Networking
        • SYSTIMAX® Structured Cabling
        • NETCONNECT® Structured Cabling
        • PANDUIT
        • APC
        • Rittal
      • Collaboration, Wireless & Mobility >
        • Zoom
        • NEC Display
        • Zoho Cliq Collaboration
        • Aruba Wireless
        • Ruckus Wireless
        • Extreme Wireless & Mobility
        • LINKSYS Wireless for SMB
        • Cradlepoint 4G/5G
        • Honeywell productivity & Mobility
      • IT Support & Test Systems >
        • Nexthink
        • PRTG Network Monitor
        • Team Viewer
        • Zoho IT & Help Desk
        • NETSCOUT
        • Fluke Networks
        • spirent
      • Retail and Consumer BU
      • IoT, Internet & Connectivity BU
    • Cloud Solutions
    • Professional Services
    • Support >
      • Escalation Procedure
      • RMA & After Sales
      • Downloads
      • Forum
    • Product Information >
      • Dell EMC smart value promotion
      • Dell EMC PowerScale
      • HPE Nimble Storage
      • Aruba SMB Networking
    • Knowledge Center
  • Marketplace
  • VAD Tech
  • Company
    • About Us
    • News
    • Events Gallery
    • Vendor Partners
    • Awards
    • Join us
  • Contact
AlJammaz Technologies
The Leading Value-Added Distributor

ترجمة بالعربية لتغطية سيسكو تالوس لـ واناكراي  Arabization for Cisco Talos coverage for WannaCry

16/5/2017

0 Comments

 
Picture
A major ransomware attack has affected many organizations across the world reportedly including Telefonica in Spain, the National Health Service in the UK, and FedEx in the US. The malware responsible for this attack is a ransomware variant known as 'WannaCry'.
The malware then has the capability to scan heavily over TCP port 445 (Server Message Block/SMB), spreading similar to a worm, compromising hosts, encrypting files stored on them then demanding a ransom payment in the form of Bitcoin. It is important to note that this is not a threat that simply scans internal ranges to identify where to spread, it is also capable of spreading based on vulnerabilities it finds in other externally facing hosts across the internet.
لقد أثر هجوم الفديه الكبير واناكراي  على العديد من المنظمات في جميع أنحاء العالم بما في ذلك تلوفونيكا في إسبانيا، وخدمة الصحة الوطنية في المملكة المتحدة، و فيداكس في الولايات المتحدة. البرمجيه الخبيثة المسؤولة عن هذا الهجوم كانت هجوم الفديه البديل المعروف باسم واناكراي
البرمجيه الخبيثة "واناكراي" كان لديها القدرة على مسح المنفذ تي سي بي 445  بشكل كبير وهو المسؤول عن (خادم حجب الرسائل اس ام بي). "واناكري" انتشر بشكل مماثل لطريقه انتشار الدوده وورم، انتهك اجهزه المضيفين، شفر الملفات المخزنة على هذه الاجهزه ثم طالب بدفع فدية ماليه على شكل بت كوين (العملة الرقمية التي يمكن التداول بها في المعاملات دون الحاجة إلى البنك المركزي). من المهم أن نلاحظ أن هذه البرمجيه الخبيثه ليست ببساطة تهديدا يقوم بمسح النطاقات الداخلية لتحديد المكان التي ستنتشر بها فقط، بل هو أيضا قادرة على نشر نفسه من خلال نقاط الضعف او الثغرات التي يجدها على اجهزه المضيفين التي يتمكن من الوصول اليها في النطاقات الخارجيه عبر الإنترنت

Read More
0 Comments

اهمية عمل النسخ الاحتياطي الجيد لضمان الاصول و البيانات الخاصة بك وامكانية استعادتها بسرعة للحماية من هجمات البرامج الخبيثة  The Importance of Data

26/2/2017

0 Comments

 
Picture

The Importance of Data Backup and Recovery to protect organizations from destructive malware

Recent Shamoon 2 activity serves as a good reminder that users and organizations need to have a comprehensive disaster recovery plan.

اهمية عمل النسخ الاحتياطي الجيد لضمان الاصول و البيانات الخاصة بك وامكانية استعادتها بسرعة للحماية من هجمات البرامج الخبيثة ​

تعتبر الاحداث الاخيرة لشمعون 2 بمثابة منبه حقيقي للمستخدمين و المنظمات عن ضرورة وجود خطة شاملة من الكوارث لحماية البيانات و استرجاعها باسرع وقت في حالة حدوث كوارث مشابهة

Read More
0 Comments

ترجمة بالعربية لتغطية سيسكو لشمعون 2  Arabization forCisco Coverage for Shamoon 2

15/2/2017

0 Comments

 
Picture
By AlJammaz Cyber security BU

Cisco Coverage for Shamoon 2

​Shamoon is a type of destructive malware that has been previously associated with attacks against the Saudi Arabian energy sector we've been tracking since 2012. We've observed that a variant of Shamoon, identified as Shamoon 2, has recently been used against several compromised organizations and institutions. Talos is aware of the recent increase in Shamoon 2 activity and has responded to ensure our customers are protected. Additionally, Talos will continue to monitor for new developments to ensure our customers remain protected

تغطية سيسكو لشمعون 2

شمعون هو نوع من البرمجيات الخبيثة المدمره و الذي ارتبط سابقا مع هجمات ضد قطاع الطاقة في المملكة العربية السعودية والذي كنا نتتبعه منذ عام 2012. ولقد لاحظنا نوع مطور جديد من شمعون ويدعى شمعون 2 استخدم مؤخرا في هجمات ضد عدد من المنظمات و المؤسسات. تالوس على اطلاع بوجود زيادة في نشاط شمعون 2 في الفترة الأخيرة واستجابت لضمان حماية عملائنا. بالإضافة إلى ذلك، سوف تستمر تالوس في مراقبة اي تطورات جديدة لنضمن لعملائنا الحماية​

Read More
0 Comments

VERITAS NETBACKUP 5240 APPLIANCE, A single-vendor, SMB and Enterprise backup appliance that is ready to backup in minutes

19/9/2016

0 Comments

 
Picture
The Veritas NetBackup™ 5240 Appliance is a fully integrated Enterprise backup appliance with expandable storage and intelligent end-to-end deduplication for physical, virtual and cloud environments. Only Veritas appliances deduplicate on both the client and target side.
Veritas NetBackup™ 5240 Appliance delivers greater capacity, density and performance to reduce customers’ operating and capital expenditures. As a purpose-built backup appliance (PBBA), it enables the ability to address customers’ data center challenges while simplifying data protection needs.

Read More
0 Comments

Cisco Business Edition 6000s, All-In-One Smart Collaboration System for the SMB

10/5/2016

3 Comments

 
Picture
Do More with Less, The Cisco BE6000 family provides complete collaboration capabilities and services that bring people closer together on any device, from any location, at any time. Its comprehensive, open, and interoperable architecture lets small & midsize businesses fulfill specific needs securely and efficiently with less hardware and reduced IT complexity and costs.
Cisco Business Edition 6000 (BE 6000) is designed for small to midsized companies with a work-force of up to 1000 workers. The standard features include high-quality voice and video communications, instant messaging capabilities, multi-user conferencing, and contacts at your fingertips, all incorporated into one device. 


Read More
3 Comments

Linksys Business Wireless-AC Series Delivers enterprise-grade software features for the SMBs

7/3/2016

0 Comments

 
Picture

STAY CONNECTED THROUGHOUT THE OFFICE

As mobile computing and communication become standards of the modern workplace, the need for a more efficient wireless network grows by the day. Linksys offers a wide range of wireless access points for secure, high-speed wireless connectivity with advanced security and management features, so your employees can stay connected across the office.

GREATER RANGE, ENHANCED MANAGEMENT FEATURES, BETTER OVERALL PRODUCTIVITY

Read More
0 Comments

Ruckus Unleashed™, The Controller-less Access Point Solution for SMB

2/3/2016

0 Comments

 
Picture
Smart devices are playing a critical role in influencing customer decisions and behaviors. While Wi-Fi devices have become an absolute requirement for customers and employees, small to midsize businesses (SMBs) are challenged to deploy 
a reliable wireless network within a limited budget and little to no IT staff. 

Ruckus Unleashed is a controller-less wireless LAN solution that enables SMBs to deliver an optimal wireless experience at an affordable price point. Configured in 60 seconds and deployed in minutes, Ruckus Unleashed eliminates the complexity pitfall of a controller-based WLAN. With easy migration options to the Ruckus ZoneDirector, SmartZone or future Ruckus platforms, Ruckus Unleashed scales with your business. Now SMBs can deliver a Wi-Fi user experience with high RF performance and network resiliency. 

Read More
0 Comments

    AlJammaz Distribution
    Knowledge Center

    Archives

    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    September 2021
    October 2020
    August 2020
    July 2020
    June 2020
    January 2020
    May 2019
    February 2019
    January 2019
    October 2018
    September 2018
    July 2018
    March 2018
    May 2017
    February 2017
    September 2016
    July 2016
    May 2016
    April 2016
    March 2016
    February 2016

    Categories

    All
    Collaboration & IP Telephony
    Consumer
    Data Centers & Cloud
    Enterprise
    Home Networking
    Security
    SMBs
    Software As A Service
    Software-as-a-Service
    Wireless LAN

    RSS Feed

Channels


System Integrators & VAR
​Cloud Resellers
Retailers
Service Providers
End User

Services


Supports
Downloads
Professional Services
Events & Workshops
Events Gallery


Company


About us
News
Contact us
Join us
Escalation Procedure

Compliance & Ethics

Direct Number:  920 000 230

Copyright © AlJammaz Technologies. All rights reserved
Privacy Policy
member of AlJammaz Group of companies