Staying ahead of change to build channel market success

Visit Us @Gitex 2016!

Your Trusted IT Security Value Added Distributor

0 days
0 hours
0 minutes
0 seconds


Global IT opportunities, consumption models and cyber threats are constantly evolving.
We’re here to lead the pack.


Discover what’s driving the global market for disruptive cybersecurity, networking and infrastructure technologies.

The Exclusive Story

Value-added distribution isn’t what it used to be. As a market leader we have recognised this from the offset. We’ve never stopped redefining value; pushing the market; innovating for our partners.

We’ve always believed that a strong business needs new technologies and new services. They need an edge.

It’s not the strongest species that survives but those who adapt to change

Charles Darwin

So disrupt or be disrupted.


Latest News

  • fav FOCUSED VAD PLAYER - Bahi Hour, technical director, Exclusive Networks, on how the company is evolving its distribution model. What is your company’s core business and how does it define itself? We identify ourselves as a super value-added distributor (VAD) for cyber security solutions, networking and Infrastructure technologies. As a distributor, Exclusive Networks accelerates market entry and growth for
  • fav Exclusive Group announces 2015 financial results - Exclusive Group has announced an underlying organic growth of 31 percent and total pro forma annualised revenues of EUR 1.04 billion for 2015. According to the company, the results prove the success of its value-centric approach, relentless focus on cybersecurity and data centre transformation opportunities, and astute acquisition strategy. The performance underlines the Group’s momentum
  • fav Exclusive Group Breaks the Billion with Biggest Acquisition: Transition Systems Asia - Purchase of Singapore based VAD extends global footprint in APAC; Delivers combined revenues of >1bn€ LONDON, UK & SINGAPORE – January 12th 2016 – Exclusive Group, the global value-added services and technologies (VAST) group, today announced the acquisition of Singapore HQ’d cybersecurity and infrastructure VAD, Transition Systems.  The acquisition, the largest in its history, adds

Upcoming Events

Exclusive Networks At GITEX 2016 @ Dubai World Trade Center Hall - 1 Stand D1 - 20
Oct 16 – Oct 20 all-day
Exclusive Networks At GITEX 2016 @ Dubai World Trade Center Hall - 1 Stand D1 - 20 | Dubai | Dubai | United Arab Emirates

Exclusive Networks to Focus on Real Solutions and New Technologies at GITEX 2016

 GITEX Technology Week, the world’s 3rd largest technology show is taking place once again next month ‪from the 16th to 20th October at Dubai World Trade Center.  Exclusive Networks will have over 10 vendors showcasing their offerings as part of the Cyber Attacks Mitigation and Remediation (CARM) portfolio.  Fortinet, F5, Gemalto, Ixia, Logrhythm, Carbon Black, Heat Software  along with the newly launched Certes and SentinelOne will be present on stand, D1-20, along with Exclusive’s team. Additionally, the group will also be unveiling their new Data Centre distribution arm, BigTec. They will be featuring solutions such as Nutanix, Nuage or Varmour and the newly renamed, Tubonomic (formally VM Turbo) and launching their latest vendor, Rubrik.

The leading Security Value Added Distributor will focus on educating partners and customers on new breakthrough security technologies while providing real solutions to the challenges they face.  Visitors will be invited to attend sessions on their stand in the “Security Room”. Held throughout the event, the agenda will be composed 20 -minute presentations followed by a Q&A. Audience will gain insight on best practices within the security industry from the vendors, while understanding how each solution distributed by Exclusive Networks can support them.  The agenda will also include sessions from the BigTec vendors.

BigTec is another major highlight for the Exclusive team this year. Launched earlier this year in the Middle East and presented for the first time at GITEX, BigTec helps its partners harness the opportunities from new cloud architectures and virtualised datacentre functions that are progressively more web-scale and software-defined. The evolution to full virtualisation of complex IT functions is embodied by BigTec’s enterprise transformation framework, guiding reseller partners and their customers from physical to hybrid and virtual datacentre environments.

The Exclusive Networks stand will not just be action and solution packed, but a chance for GITEX visitors to find entertainment. Attendees will have a chance to become the “2016 EXN Cyber Ninja”, a customized and original computer game developed for Exclusive Networks ME only! Chances to play will be limited, based on pre-registrations taking place directly at the stand or online on their websites. At the end of each day, the top scorer of the game will be announced and walk away with a special price.

Finally, partners must not miss their chance to take part in the Exclusive Networks cocktail party held in a private location during GITEX and by invitation only!  Come visit D1-20 for more information. Register Now!

F5 Big-IP Application Security Manager (ASM) V12 @ Exclusive Networks Training Center
Oct 17 @ 9:00 am – Oct 20 @ 5:00 pm
F5 Big-IP Application Security Manager (ASM) V12 @ Exclusive Networks Training Center | Dubai | Dubai | United Arab Emirates

F5 Big-IP Application Security Manager (ASM) V12

The BIG-IP Application Security Manager course gives participants a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day.

The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. The course includes detailed analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current attack vectors.

After course completion, participants will be able to differentiate between negative and positive security models, and configure the most appropriate protection for their own web applications

Topics covered in this course include:

Setting up the BIG-IP system
Traffic processing with BIG-IP Local Traffic Manager (LTM)
Web application concepts
Web application vulnerabilities
Security policy deployment
Attack signatures
Positive security building
Cookies and other headers
User roles and administration
Advanced parameter handling
Application templates
Real Traffic Policy Builder
Vulnerability scanners
Login enforcement and session tracking
Anomaly detection
ASM and iRules
AJAX and JSON support
XML and web services support
Course length: 4 days


This course is intended for security and network administrators who will be responsible for the installation and day-to-day maintenance of the Application Security Manager.


Students should be familiar with the F5 BIG-IP Product Suite and, in particular, how to setup and configure a BIG-IP LTM system, including virtual servers, pools, profiles, VLANs and self-IPs.

There are no required F5 prerequisites for this course, but completing one of the following before attending would be very helpful for students unfamiliar with BIG-IP:

Administering BIG-IP V11 instructor-led course
F5 Certified BIG-IP Administrator
In addition, the following web-based courses will be very helpful for any student with limited BIG-IP administration and configuration:

Getting Started with BIG-IP web-based training
Getting Started with BIG-IP Application Security Manager (ASM) web-based training

Students should understand:

TMOS administration
Network concepts and configuration
Programming concepts
Security concepts and terminology
Web application delivery

Menu Title