cl-au logo
Story image

Channel guru brings Bufferzone to A/NZ

27 May 2020

Technology entrepreneur Greg Wyman has launched the Australia and New Zealand operation of Bufferzone Security, a provider of endpoint security solutions.

Previously, Wyman brought Backup Exec/Veritas, Brocade and StorageCraft to the region and now is hoping to add another brand to his list of success stories.

Bufferzone’s A/NZ business will augment operations in the US, Europe, Japan, South Asia, Africa and Israel. 

The company protects organisations from advanced threats including ransomware, zero-day attacks and phishing scams.

“We are proud to work with Greg and his A51 team and introducing an MSP (Managed Service Provider) model for our technology. We believe Australia and New Zealand are perfect for the initial launch of this program due their size, culture and vast number of SMB businesses,” says Bufferzone CEO Israel Levy

Bufferzone’s solution protects endpoints of all business sizes by creating a local, lightweight and secure virtual container on each user’s PC or laptop that prevents malware from escaping to infect the corporate network.

“According to Verizon in 2019, 94% of data breaches start with email and/or the web. Using Bufferzone, whenever a user clicks a web link, visits a website, downloads a file from the web or opens an email attachment, it is opened in a lightweight, secure virtual container located on the user’s PC or laptop,” Wyman says.

“Malware can’t escape from that container, so the user’s PC/laptop is protected and malware is prevented from compromising the corporate network, even with remote workers. Our ethos is ‘we know you can’t detect all threats, but you can contain them’.

“We are an ideal complement to existing security products. We are able to deliver an exceptional level of protection of endpoints and prevention of network infections as a powerful, reliable and affordable complement to all security strategies.”

Bufferzone endpoint security solutions protect enterprises from advanced threats including ransomware, zero-days, phishing scams and APTs. 

With containment, bridging and intelligence capabilities, it gives employees access to internet applications; mail and messaging applications such as Zoom, Teams, Whatsapp, Line and WeChat; network folders; and removable storage without putting an organisation's core systems.

Bufferzone recently announced the availability of BUFFERZONE WFH (Work From Home) package, allowing its customers to securely access corporate resources on all Windows PCs, including home Windows PCs.

It assumes that the home PC is not secure, not managed, and should not retain corporate data. It will not allow access to the content in the contained session from outside of the container, keeping corporate data safe. 

Story image
Hands-on review: OPPO Reno 4 and Reno 4 Pro 5G
If you use a phone for professional-looking photos and great video content, both these models deserve your attention.More
Story image
Hybrid cloud is the ideal IT infrastructure model, says majority of IT execs
76% of surveyed IT decision-makers reported thinking more strategically about IT because of the pandemic, and nearly half (46%) have increased investments in hybrid cloud as a direct result of COVID-19.More
Story image
nOps joins Ingram Cloud to enhance AWS capabilities
The alliance expands Ingram Micro’s offering of tools for reseller partners and MSPs designed to help build an AWS infrastructure.More
Link image
Join Nintex on 3 December for Workflow Wonders: TLC for Kids
TLC for Kids is a charity that puts smiles back on childrens’ faces during times of illness. Learn how the charity leverages Nintex to free up resources so it can focus on what really matters. Nintex will donate A$5 for each registration to TLC for Kids! Find out more.More
Story image
Micro Focus pledges deeper channel commitment in APJ
“Through the strengthened relationship we have with our network of resellers and distributors in Asia Pacific and Japan, we want to instil in them a renewed sense of confidence."More
Story image
Forrester names Thycotic a Leader in privileged access management
Thycotic received the highest possible score in 11 of the 24 criteria in the study, including SaaS/cloud, innovation roadmap, and integrations, deployment, supporting products and services, commercial model, and PIM installed base.More