View
Sorting
Products found: 66
AppSpider
Armis IoT Security Platform
- Comprehensive device and asset discovery
- Device type, location, software, vulnerabilities, services used, and more
- Connection history for forensics
- Passive monitoring which does not disrupt devices
- Devices that are behaving correctly
- Devices that are acting suspiciously
- Devices that may be part of a botnet or vulnerable
- Leverage your existing infrastructure
- Take action Immediately
- Gain the peace of mind you need for all devices, managed or unmanaged
Barracuda Backup
Barracuda CloudGen Firewall
- Protection Against Advanced Threats and Zero-Hour Attacks.
- Secure SD-WAN: Reduce Costs and Ensure Application Availability.
- Remote VPN Access for Off-Network Users – Anytime, Anywhere.
- Secure Migration to the Public Cloud and Hybrid Environments.
- Secure Connectivity for IoT Devices and Industrial Control Systems.
- Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
- VPN across multiple broadband connections and MPLS replacement
- Up to 24 physical uplinks to create highly redundant VPN tunnels
- Replacing network backhauling central policy enforcement architectures with direct internet breakouts
- Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic
- Guaranteed user access to critical applications through granular policy controls
- Increased available bandwidth with built-in traffic compression and data deduplication
- Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Barracuda Email Security Gateway
Barracuda Load Balancer
Barracuda Message Archiver
Barracuda NextGen Firewall (NGFW)
- Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
- VPN across multiple broadband connections and MPLs replacement
- Up to 24 physical uplinks to create highly redundant VPN tunnels
- Replacing network backhauling central policy enforcement architectures with direct internet break outs
- Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic
- Guaranteed users' access to critical applications through granular policy controls
- Increased available bandwidth with built-in traffic compression and data deduplication
- Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Barracuda PhishLine
Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees into a layer of defense with Barracuda PhishLine.
With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.
Only PhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.
Barracuda PhishLine trains users to understand and respond correctly to the latest phishing techniques, recognize subtle phishing clues, and prevent email fraud, data loss, and brand damage. It transforms employees into a powerful line of defense against damaging phishing attacks.
This versatile, scalable, cloud-hosted SaaS solution includes hundreds of email and landing-pages templates, updated based on threat trends. Levelized training and gamification make it more effective by engaging employees.
Phishing Training
Barracuda PhishLine uses advanced, automated education technology that includes simulation-based training, continuous testing, powerful reporting for administrators, and active incident response awareness.
Phishing Simulation
Simulated phishing attacks are constantly updated to reflect the most recent and most common threats. Simulations are not limited to email, but also include voice, SMS, and portable-media (USB stick) attacks. Templates let you customize simulations.
Phishing Reporting
Barracuda Phishline provides advanced analytics and reporting tools that enable you to identify how effective your training is and how users react to actual phishing attacks that may slip through other defenses.
Patented Simulations
PhishLine's patented attack simulations train your employees to spot email threats that can compromise data and result in financial and reputational loss. A/B tests prevent users from receiving duplicate simulations.
Total Email Protection Portfolio
PhishLine is part of Barracuda’s Total Email Protection portfolio, delivering truly comprehensive email security.
Curated Content
PhishLine Content Center Marketplace™ provides dozens of simulation templates, landing pages, risk-assessment surveys, and other training content. New, customizable content is added daily, to reflect current threat trends.
Gamification
PhishLine boosts user engagement with gamification. Videos, infographics, newsletters, and other materials supplement core training.
Levelized Programs
As employees progress through their training program, the content constantly changes, challenging them to continuously improve their phishing detection and reporting skills.
PhishLine Concierge Service (Optional)
PhishLine Concierge is an optional service that offloads the complex tasks of defining, configuring, executing, and analyzing your simulation campaigns to a dedicated consultant, to minimize your resource overhead.
Barracuda Sentinel
Identify and Secure Your Highest-Risk Individuals Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. Part of a Complete Email Protection Platform With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. Sentinel Detects Threats that Email Security Gateways Can't Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. Protect Your Business Against Account Takeover Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. Features Stop Targeted Attacks with AI
- Prevent Spear Phishing
- Prevent BEC and CEO Fraud
- Detect Employee Impersonation
- Stop Zero-Day Phishing
- Detect Web Impersonation
- Stop Inbound Spoofing
- Continuous Learning
- Exportable Reports
- Alerting for Account Takeover
- Prevent Account Takeover Infiltration
- Detect Compromised Emails
- Delete Emails Sent Internally
- Notify External Recipients
- Lock Attackers Out of Accounts
- Prevent Third Party Domain Spoofing
- Automated DMARC Reporting
- DMARC Aggregation and Visualization
- DKIM/SPF Configuration and Troubleshooting
- Better Email Deliverability
- Spoofed Email Reports
- Detect Misconfigured Legitimate Senders
- Protects Customer Brands
- Exportable Reports
- Lightweight Architecture
- Instant Setup
- Works with Any Gateway
- Historical Assessment
- Test Employee Security Awareness
- 80 Real-World Templates
- Simulate Impersonation and BEC
- AI Determines Employee Risk
Barracuda WAF-as-a-Service
- Application security is complicated to deploy and manage without specialized resources.
- Continuous updates to applications can lead to new vulnerabilities.
- Legacy applications were developed without secure coding practices.
- Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.
- Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.
- Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.
- Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.
- Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.
- Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.
Barracuda Web Application Firewall
Barracuda Web Security Gateway
Brillix JumbleDB
- Rich out-of-the-box sensitive data classification dictionary
- Predefined and custom sensitive data masking algorithms
- Cross database-instance sensitive
- Data masking
- Masking preview
- Sensitive data baseline
- Time to Market
- Affordable
- One Stop Shop
- Intuitive and Robust
Citrix ADC (Application Delivery Controller)
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.
Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.
The main features of Citrix ADC:
- Provides industry-leading app delivery and load balancing
- Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement
- Offers the most comprehensive set of ADC features in the ACI ecosystem
- Enables automation and orchestration of network-critical services to boost agility
Citrix Content Collaboration (ShareFile integration)
Citrix Content Collaboration(ShareFile integration)is an enterprise content collaboration platform that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise. Citrix Content Collaboration offers the flexibility to choose the location where files are stored at rest, either inside a Citrix-managed cloud-native storage repository or inside a storage repository managed by the customer.
Citrix Content Collaboration consists of three primary components:
- Content Collaboration management plane,
- storage zones
- Citrix Files apps.
Management plane: a Citrix-managed component hosting the Content Collaboration services and business logic, hosted in either the United States or the European Union.
Storage zones: the location where customer files are stored. Customers have a choice in where to store files, either hosted by Citrix or hosted by the customer in their own datacenter or on their own public cloud service subscriptions. This reference architecture will focus on a customer-managed storage zone hosted inside the customer datacenter.
Citrix Files: native apps providing access to the Content Collaboration services. Citrix Files apps are available for Windows, macOS, iOS and Android, as well as Outlook and Gmail.
Key features of Citrix Content Collaboration:
- Enable true business-class data security for mobile users while maintaining total IT control.
- Your team or clients can access, sync, and securely share files from anywhere, on any device.
- Automate feedback and approval workflows to streamline your business and maximize productivity.
Citrix Endpoint Management (XenMobile)
MDM features of Endpoint Management let you:
- Deploy device policies and apps.
- Retrieve asset inventories.
- Carry out actions on devices, such as a device wipe.
- Secure apps and data on BYO mobile devices.
- Deliver enterprise mobile apps.
- Lock apps and wipe their data.
- Manage a corporate-issued device by using MDM
- Deploy device policies and apps
- Retrieve an asset inventory
- Wipe devices
- Deliver enterprise mobile apps
- Lock apps and wipe the data on devices
Citrix NetScaler
Citrix SD-WAN
- Unparalleled experience for SaaS, cloud, and virtual applications
- Choice of deployment options with automated connectivity to the cloud
- Integrated visibility and control over all aspects of the WAN
Citrix Virtual Apps and Desktops (XenApp and XenDesktop)
- HDX technology for optimized user experience
- Virtual Windows, Linux and web applications
- Single management console for apps and desktops
- Centralized security in the data center
- FIPS and Common Criteria certified
- Single image provisioning technology
- VDI desktops
- Remote PC access
- Citrix is also unifying product editions across its portfolio – designating them Standard, Advanced, and Premium.
- XenApp Advanced edition now will map to Citrix Virtual Apps Standard edition
- XenApp Enterprise edition maps to Citrix Virtual Apps Advanced edition
- XenApp Platinum edition maps to Citrix Virtual Apps Premium edition
- XenDesktop VDI edition maps to Citrix Virtual Desktops Standard edition
- XenDesktop Enterprise edition maps to Citrix Virtual Apps and Desktops Advanced edition
- XenDesktop Platinum edition maps Citrix Virtual Apps and Desktops Premium edition