For Resellers

 

certificate types
 

Wesentra stands for "We Secure Network Traffic". The Wesentra Team has been providing Entrust SSL/TLS certificates to customers in the Nordics since 2011. This background has brought us new ideas and opportunities we like to share with our partners and customers.

Today Wesentra works with three vendors:
  • Entrust SSL/TLS certificates, digital identities, PKI and more
  • Cofense Phishing Defense Phishing simulation and mitigation tools, Incident response and mitigation
  • ExtraHop Reveal(x) Network Traffic Analysis, Intrusion Detection aka Network Detection and Response

We are here to help and urge our resellers to contact us when there is an open question. We have often 10-15-minute remote sessions and solve these questions.

How the SSL/TLS collaboration works:

Our resellers are usually system integrators and service providers and typically need SSL/TLS certificates as a part of their own offering. When end customer needs an SSL/TLS certificate, the end customer is added to the Entrust Certificate Services portal by reseller. The end customer organization and its domains are verified in a couple of days by Wesentra/Entrust and the certificate can be created. For an existing customer, the certificate can be created by the reseller immediately.

The reseller orders annual certificate units to the Entrust Certificate Services Portal either by email/phone or by using the self-service method and creates the certificate for the end customer. Wesentra invoices the used units (either after each delivery or once a month).

In addition to providing encryption for the network traffic, an OV or EV certificate shows the identity of the organization. The user of the web service can be sure that a trust-worthy Certificate Authority (CA) has validated the existence of the organization and has checked its right to get and use the certificate.

Entrust is perhaps the most respected Certificate Authority with the cleanest track-record since 1994. Wesentra is the accredited verification partner of Entrust in the Nordics. This makes the process easier and quicker for the end customer.

How the Phishing Defense collaboration works:

As a distributor, Wesentra will provide the reseller with up to date pricing , product demonstration, white labelled documents, and sales support. Technical support in most cases come directly from the vendor, but Wesentra is known for it's customer service, so we will not turn our backs on questions.

in the modern digital world in building a resilient culture against Phishing are:

Everyone is a target.
Even though the perimeter protection is in place, Phish will get through.
You cannot protect yourself from an attack you cannot see.
Even the best training or protection measures will not save you from someone clicking.
User is not the problem, they are part of the solution

Cofense Phishing defense consists of  range of tools that work perfectly together. More than 12 years of development is behind the solution which first started, and is still known, as PhishMe.

  • PhishMe + Reporter – Helps to create a resilient organization with a reporting culture.
  •  Triage – incident response and automation. Cluster reported Phish and analyze them in clusters instead of one by one. Automated responses to end users
  •  Vision – Search and Destroy – Uses Triage to find and eliminate all the Phish from all users inboxes. Even those who did not report.

Read more...

How the Network Detection and Response collaboration works:

Wesentra will provide the reseller with up to date pricing , product demonstration, white labelled documents and sales support. Technical support in most cases come direct from the vendor, but Wesentra is known for it's customer service, so we will not turn our backs on questions.

The challenges in the modern digital world against breaches are:

Everyone gets breached
Perimeter protection is needed, so is SIEM, but cybercriminals have unlimited possibilities and resources to get through
No visibility to network wiredata means no visibility
Silos: NetOps, ItOps and SecOps, too many sources of data causes lack of understanding the attacks
GDPR give you 72 hours to report what got stolen
Often there are no resources to protect your crown jewels, resources are needed to run the business

Reveal(X) – Network Detection and Response:

  • Collects wire data
  • Uses machine learning to categorize and analyse the traffic
  • User can drill down to the root cause of an anomaly and has guided tools to resolve it

Read more...