For the best experience, please enable scripts in your browser.
×
Vendors
Services
Trend Micro Authorized Training Center (ATC)
Global service operations
Subscription Service
Marketing
Global consulting & professional services
Support
Exclusive Global Deal Desk
Training
News
Contact
About us
Why us
Sustainability
Global Coverage
Leadership Team
Ignition Technology
Nuaware
Careers
Contact Us
Investors
Choose Country...
Global
View All
Africa
South Africa
Albania
Australia
Austria
Belgium
Bosnia Herzegovina
Bulgaria
Canada
Canada FR
Croatia
Czech Republic
Denmark
Estonia
Finland
Finland (English)
France
Germany
Hong Kong
Hungary
Iceland
India
Indonesia
Ireland
Israel
Italy
Kosovo
Latvia
Lithuania
Malaysia
Middle East
Montenegro
Netherlands
New Zealand
North Macedonia
Norway
Philippines
Poland
Portugal
Romania
Saudi Arabia
Serbia
Singapore
Slovakia
Slovenija
Spain
Sweden
Switzerland DE
Switzerland FR
Thailand
Turkey
USA
Ukraine
United Kingdom
Vietnam
Vendors
Services
Trend Micro Authorized Training Center (ATC)
Global service operations
Subscription Service
Marketing
Global consulting & professional services
Support
Exclusive Global Deal Desk
Training
News
Contact
About us
Why us
Sustainability
Global Coverage
Leadership Team
Ignition Technology
Nuaware
Sitemap
Pages
About us
Careers
Contact
Global Coverage
Leadership Team
News
Why us
Ignition Technology
Nuaware
Contact Global
Content Library
Events
Exclusive Global Deal Desk
Exclusive Networks Privacy Policy
Global Locations
Home
Legal & Compliance
Data Consent
Ethics & Code of Conduct
Third Party Information Notice
Website Cookie Policy
Whistleblowing Policy
Services
Flexible finance programme
Global consulting & professional services
Global services operation
Marketing
MSSD: Managed Security Services Distributor
Subscription Service
Support
Trend Micro Authorized Training Center (ATC)
Sitemap
Thank you form confirmation
Posts by category
Category:
Blog
Securing Your Business in 2025: The Power of F5 Distributed Cloud
Quickly getting risk insights with Palo Alto Networks SLR
MFA push authentication is getting less secure
Fortinet: The Best Industry Analyst Positioning
Converging Network Management and Security
Redefining Secure Access with ZTNA and SASE
How to Overcome the Ultra-Low Latency Challenge with 5G?
Advanced threat protection: Sandbox Integration via API
Automated Infrastructure Security in One Solution
Get started with Kubernetes in 15 minutes
Red Hat hybrid cloud – IaaS and PaaS from on-prem to public cloud via open source software
Video – Network analytics and malicious event correlation made easy
Why legacy firewall is not good enough?
Apex One to rule them all
How Mature Are Your Cyber Defender Strategies?
Symantec web security solutions: securing legacy LDAP authentication scenarios
Polycom Trio goes professional with VisualPro!
DNS Security – New imperative for connected cars and driver safety
Importance of vulnerability assessment in your IT environment
Arbor Edge Defense – First and Last Line of Defense Against Cyber Threats
3 reasons why you’ll need an IP Address Management (IPAM) Strategy in 2019
Are You Sure Those Domains Are What You Think They Are?
PSD2: Which door are you choosing?
Application Permanence and Consistency: How to Stop Worrying and Love App Management
F5 BIG-IP Cloud Edition – More Flexibility for your Apps
WAF – What, where, how and why?
Google Chrome 68 starts labeling HTTP sites as ’not secure’. Protect your website with SSL certificates!
No escape from HTTPS: Chrome insists on a secure web
Video conference “to go”
The Internet never sleeps – why do we need a load balancer?
Chrome 68 – or how TLS (previously SSL) is rapidly becoming the new TCP
Polycom EagleEye Director II: Ideal camera for large classrooms
Look who’s watching – Polycom Trio 8800 and EagleEye MSR Camera
Polycom RealConnect for O365 Cloud
Threat Isolation – Additional Symantec Protection from Web and Email-Based Threats
Symantec Positioned in the Leaders Quadrant of the Inaugural Gartner CASB
PSD2 Directive: Are you ready to manage public API interfaces?
The award-winning Trend Micro XGen security
Symantec Content Analysis System – central component of the ATP system
F5 APM: discover the most frequent use cases
F5 BIG-IP APM – secure access to all types of applications, from legacy to cloud
Successful attack prevention and system maintenance
Visibility and management of SSL traffic using F5 solutions, Part 1
After Wannacry, Petya. And a key innovation.
WannaCry and Symantec: All you need to know is that you are protected
Wannacry? No need to, it’s not that bad
Sophisticated phishing attacks and the value of EV certificates
F5 Networks Wireshark Plugin
CloudSOC Audit: Discover ShadowIT with existing ProxySG products
GigaSMART Application Session Filtering
HTTP is disappearing: are you ready?
Data encryption and simple encryption management regardless of data location
SSL certificates: authentication and signing content with Entrust
Category:
Exclusive Networks Blog
Category:
News
Exclusive Networks Strengthens Leadership as Fortinet’s Largest EMEA Distributor with Platinum Sponsorship at Accelerate 2025
Category:
News
Veracomp d.o.o. Beograd is now Exclusive Networks
Veracomp d.o.o. Sarajevo is now Exclusive Networks BH d.o.o.
Varacomp Croatia is now Exclusive Networks Croatia
Veracomp Exclusive Network Has Signed a Distribution Agreement with Huawei
Veracomp Exclusive Networks now Palo Alto Distributor in the Adriatics
Exclusive Networks Completes Acquisition of Veracomp
Commvault distribution at Veracomp Adriatics!
Change of Ownership at Veracomp
Veracomp is the new Adriatics distributor for Jabra
Veracomp Adriatics during COVID-19 pandemic
Thales + Gemalto – Global leader for digital identity and security
New distribution in Veracomp portfolio – Fortinet
Gartner releases new SWG and CASB reports – Symantec among top vendors
New distribution in Veracomp – MailStore
Infoblox solutions now available from Veracomp
Getting Started with Ansible: How to Create Your First Playbook?
F5 WAF Named a Leader in Forrester Wave
SafeNet Luna HSM 6 eIDAS Certification
Trend Micro™ PHISH INSIGHT Free Phishing Simulation Service
Take advantage of Virtualisation and the Cloud
SaaS security: Migration from On-premise to the Cloud
Small business is big business to hackers!
Seal, Lock & Protect: How not to leave your networks and cloud vulnerable
Replace your IBM Next-Gen IPS with with XGen™ Security from Trend Micro
New partnership with Nextsense
Veracomp Distributions – Symantec and Trend Micro – Leaders in Endpoint Protection
Veracomp becomes new distributor for Arbor Networks
F5 Named a Leader in Gartner Magic Quadrant for Web Application Firewalls
Symantec is Named the Leader in Secure Web Gateways by Gartner Magic Quadrant for the Tenth Time
Veracomp Adriatics has become Symantec Distribution Partner for the Adriatic region
Veracomp becomes Slovenian distributor of Gemalto Solutions
Tenable Network Security at Veracomp
Category:
Uncategorised
Veracomp Informacijske Tehnologije is now Exclusive Networks Slovenia
Vacancies
Security Engineer (Croatia)
Presales Engineer (Bosnia and Herzegovina)
Product Manager (Slovenia)
Business Development Manager (Serbia)
Product Manager (Serbia)
Presales Engineer (Serbia)
Events
Fortinet [AI Driven Security Operations] Breaking the Kill Chain with AI-Driven Breach Protection
Fortinet [Security Driven Networking] Constructing a Secure SD-WAN Architecture
Fortinet [Security Driven Networking] Introduction to Fortinet Network Security
Vendors
Nextsense
MailStore
Fudo Security
Netscout (Arbor Networks)
Palo Alto Networks
Broadcom (Symantec)
Trend Micro
Proofpoint
Huawei
Hewlett Packard Enterprise
Gigamon
Fortinet
F5 Networks
Entrust
Commvault
Nozomi Networks
Pure Storage
Tenable
Red Hat
Poly
Lifesize
Thales
Extreme Networks