View
Sorting
Products found: 224
Aruba Switch…
The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.
Azure Data Warehouse…
Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.
Get rid of worries
Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.
Azure Resiliency…
- Availability Zones
- Availability sets
- Virtual Machine Scale Sets (VMSS)
Azure Virtual Machines…
Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling.
Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.
Barracuda Backup…
Barracuda CloudGen Firewall…
- Protection Against Advanced Threats and Zero-Hour Attacks.
- Secure SD-WAN: Reduce Costs and Ensure Application Availability.
- Remote VPN Access for Off-Network Users – Anytime, Anywhere.
- Secure Migration to the Public Cloud and Hybrid Environments.
- Secure Connectivity for IoT Devices and Industrial Control Systems.
- Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
- VPN across multiple broadband connections and MPLS replacement
- Up to 24 physical uplinks to create highly redundant VPN tunnels
- Replacing network backhauling central policy enforcement architectures with direct internet breakouts
- Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic
- Guaranteed user access to critical applications through granular policy controls
- Increased available bandwidth with built-in traffic compression and data deduplication
- Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Barracuda Email Security Gateway…
Barracuda Load Balancer…
Barracuda Message Archiver…
Barracuda NextGen Firewall (NGFW)…
- Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
- VPN across multiple broadband connections and MPLs replacement
- Up to 24 physical uplinks to create highly redundant VPN tunnels
- Replacing network backhauling central policy enforcement architectures with direct internet break outs
- Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic
- Guaranteed users' access to critical applications through granular policy controls
- Increased available bandwidth with built-in traffic compression and data deduplication
- Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Barracuda PhishLine…
Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees into a layer of defense with Barracuda PhishLine.
With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.
Only PhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.
Barracuda PhishLine trains users to understand and respond correctly to the latest phishing techniques, recognize subtle phishing clues, and prevent email fraud, data loss, and brand damage. It transforms employees into a powerful line of defense against damaging phishing attacks.
This versatile, scalable, cloud-hosted SaaS solution includes hundreds of email and landing-pages templates, updated based on threat trends. Levelized training and gamification make it more effective by engaging employees.
Phishing Training
Barracuda PhishLine uses advanced, automated education technology that includes simulation-based training, continuous testing, powerful reporting for administrators, and active incident response awareness.
Phishing Simulation
Simulated phishing attacks are constantly updated to reflect the most recent and most common threats. Simulations are not limited to email, but also include voice, SMS, and portable-media (USB stick) attacks. Templates let you customize simulations.
Phishing Reporting
Barracuda Phishline provides advanced analytics and reporting tools that enable you to identify how effective your training is and how users react to actual phishing attacks that may slip through other defenses.
Patented Simulations
PhishLine's patented attack simulations train your employees to spot email threats that can compromise data and result in financial and reputational loss. A/B tests prevent users from receiving duplicate simulations.
Total Email Protection Portfolio
PhishLine is part of Barracuda’s Total Email Protection portfolio, delivering truly comprehensive email security.
Curated Content
PhishLine Content Center Marketplace™ provides dozens of simulation templates, landing pages, risk-assessment surveys, and other training content. New, customizable content is added daily, to reflect current threat trends.
Gamification
PhishLine boosts user engagement with gamification. Videos, infographics, newsletters, and other materials supplement core training.
Levelized Programs
As employees progress through their training program, the content constantly changes, challenging them to continuously improve their phishing detection and reporting skills.
PhishLine Concierge Service (Optional)
PhishLine Concierge is an optional service that offloads the complex tasks of defining, configuring, executing, and analyzing your simulation campaigns to a dedicated consultant, to minimize your resource overhead.
Barracuda Sentinel…
Identify and Secure Your Highest-Risk Individuals Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. Part of a Complete Email Protection Platform With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. Sentinel Detects Threats that Email Security Gateways Can't Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. Protect Your Business Against Account Takeover Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. Features Stop Targeted Attacks with AI
- Prevent Spear Phishing
- Prevent BEC and CEO Fraud
- Detect Employee Impersonation
- Stop Zero-Day Phishing
- Detect Web Impersonation
- Stop Inbound Spoofing
- Continuous Learning
- Exportable Reports
- Alerting for Account Takeover
- Prevent Account Takeover Infiltration
- Detect Compromised Emails
- Delete Emails Sent Internally
- Notify External Recipients
- Lock Attackers Out of Accounts
- Prevent Third Party Domain Spoofing
- Automated DMARC Reporting
- DMARC Aggregation and Visualization
- DKIM/SPF Configuration and Troubleshooting
- Better Email Deliverability
- Spoofed Email Reports
- Detect Misconfigured Legitimate Senders
- Protects Customer Brands
- Exportable Reports
- Lightweight Architecture
- Instant Setup
- Works with Any Gateway
- Historical Assessment
- Test Employee Security Awareness
- 80 Real-World Templates
- Simulate Impersonation and BEC
- AI Determines Employee Risk
Barracuda WAF-as-a-Service…
- Application security is complicated to deploy and manage without specialized resources.
- Continuous updates to applications can lead to new vulnerabilities.
- Legacy applications were developed without secure coding practices.
- Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.
- Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.
- Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.
- Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.
- Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.
- Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.
Barracuda Web Application Firewall…
Barracuda Web Security Gateway…
Check Point 1200R…
Features
Wide range of appliances for IT and OT networks The 1200R Rugged Appliance complements our extensive appliance family to support a diverse range of deployment environments and meet specialized requirements in ICS security. The 1200R complies with industrial specifications such as IEEE 1613 and IEC 61850-3 for heat, vibration and immunity to electromagnetic interference (EMI). In addition, the 1200R is certified for maritime operation per IEC-60945 and IACS E10 and complies with DNV 2.4. The 1200R Appliances can also be used in commercial deployments. Inspect Encrypted Connections There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data. Next-Generation Firewall Check Point Application Control has broad support for specialized Industrial Control System and SCADA protocols with granularity for over 800 SCADA specific commands. This enables protocol-specific visibility and controls with directional awareness. Integrated threat detection and prevention Detect and prevent targeted attacks against ICS/SCADA components in Operational Technology (OT) environments with specific protections for these highly vulnerable, unpatched, legacy embedded systems. Our threat prevention technologies have the best catch rate in the industry and can be deployed in detect-mode to minimize the disruption of operational processes. Best-in-class management Administrators can define security policy for the entire network — including internal security, main sites, and remote sites — from a single, centrally located Check Point Security Management server. With SmartProvisioning™, a profile-based management approach designed for large- scale deployments, administrators can define a single security and device profile and apply it simultaneously to thousands of appliances — dramatically reducing deployment time and administrative overhead.Benefits
- Deploy SCADA networking security in harsh environments and remote locations
- Full visibility and granular control of SCADA traffic
- Comprehensive security with SCADA-aware threat detection and prevention
Check Point 21000 Appliances…
Check Point 600 Appliance…
Check Point Intrusion Prevention System Software Blade…
- Next-generation security prevention, protection and performance
- Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
- Check Point is ranked #1 in Microsoft and Adobe threat coverage
- Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
- Unrivaled, multi-Gigabit performance in an integrated IPS
- Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
- Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
- CoreXL technology provides the most efficient and high-performance use of multi-core technologies
- Lowest TCO and fastest ROI of any enterprise-class firewall solution
- One-click activation of IPS and firewall protection on any Check Point gateway
- Delivers unmatched extensibility and flexibility—all without adding CapEx
- Integrated into Check Point Software Blade Architecture for on-demand security
- Malware attacks
- Dos and DDoS attacks
- Application and server vulnerabilities
- Insider threats
- Unwanted application traffic, including IM and P2P
- Geo-protections
- New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.
- Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.
- Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.
- Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.
- Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.
- Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.
- Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.
Check Point Next Generation Firewall (NGFW)…
- Identify, allow, block or limit usage of applications, and features within them
- Enable safe Internet use while protecting against threats and malware
- Leverage the world's largest application library with more than 6,600 web 2.0 applications
- Create granular policy definitions per user and group
- Integrate seamlessly with Active Directory
- Protect environments with social media and Internet applications
- Rely on 24/7 advanced protection
- Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities
- Get greater understanding into security events with integrated, easy-to-use centralized management
- Join more than 170,000 customers, including 100 percent of Fortune 100 companies
- Querying the Active Directory
- Through a captive portal
- Installing a one-time, thin client-side agent