We are delighted to announce that, as of October 1, 2024, Fortis has been appointed the official distributor of CommVault solutions in the following countries: Estonia, Latvia, Georgia, Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan, Mongolia, Armenia, Kazakhstan, and Azerbaijan.
CommVault solutions enable us to provide our partners and customers with top-tier data backup tools from the industry leader. With the addition of CommVault's built-in security services, we enhance our capabilities as a provider of comprehensive data solutions. We are confident that this partnership will allow CommVault to expand its business opportunities, thanks to Fortis's wide geographical presence and our portfolio of complementary solutions and services.
At Fortis Distribution, we are transforming the IT landscape as a premier Value-Added Distributor (VAD) specializing in advanced information security, networking, and cloud technologies. Since our founding in 2019, we have been committed to empowering businesses with innovative solutions and comprehensive support, focusing on creating new market demand rather than relying on existing ones.

Vulnerabilities in signed drivers are mostly utilized by game cheat developers to circumvent anti-cheat mechanisms, but they have also been observed being used by several APT groups and in commodity malware alike. Using cheating codes for video games can put a user's computer at risk of cyberattacks.

  

Unless you go out of your way to install the patch, your system could be exposed. THE WIDELY USED malware ZLoader crops up in all sorts of criminal hacking, from efforts that aim to steal banking passwords and other sensitive data to ransomware attacks. Now, a ZLoader campaign that began in November has infected almost 2,200 victims in 111 countries by abusing a Windows flaw that Microsoft fixed back in 2013.

Check Point Software Technologies, a provider of cybersecurity solutions, is named for 22-times among the leaders of the Gartner magic quadrant in the Enterprise Network Firewall segment. Check Point Software is the only company that has been recognized as a leader in the segment 22 times.

 

The cyber criminals didn't have summer vacations. In August, hacker groups launched attacks against several organizations. Conti operators were more proactive in hacking into the systems of SAC Wireless, a subsidiary of Nokia in the United States. They were able to upload the stolen information to their cloud server and encrypt files in compromised systems.

 

The Internet is full of tips and rumors on how to organize a system of corporate protection, but often the desire to protect yourself from all sides leads to a diametrically opposite result. Roman Bogomolov, Head of Technical Expertise at Fortis, a distributor of Check Point Software Technologies, talks about five corporate security myths and what approach can truly protect the network and devices.

EVERY THIRD TOURIST DON'T PROTECT THEIR DATA DURING THEIR HOLIDAYS. ESET, an international expert in information security, conducted a study on how Russians protect sensitive data on vacation, interviewing several hundred social media users.* A multivariate  survey found that 30% of respondents do not use anything to protect their smartphones while traveling. The remaining 70% are more vigilant: 

Vasily Diaghilev, Head of Check Point Software Technologies in Russia and CIS, talks about the main achievements of the company in our new reality. Over the past year and a half, life around us has changed a lot. In 2020, many companies have been trying to figure out what to do in the face of a pandemic, remoteness, and mass uncertainty. Everyone was thinking about