View
Sorting
Products found: 53
Bigleaf Cloud-first SD-WAN
BMC Remedy IT Service Management
CA Service Management
Cisco Connected Mobile Experiences (CMX)
Benefits With the CMX solution, you can:
- Analyze business performance and optimize marketing activities through quantitative analysis of activity at your facility, for example, determining the patency of a particular store
- Increase the profitability per square meter by optimizing the location using the detailed traffic of the outlet, the conversion rate of visitors into customers, as well as other information, up to specific zones, as well as quantifying the implementation of changes
- Increase customer satisfaction by ensuring that there are enough staff during peak periods
- Increase profitability using location data for optimal mobile marketing campaigns.
Cisco Prime Infrastructure
Cisco Prime Infrastructure has what you need to simplify and automate management tasks while taking advantage of the intelligence of your Cisco networks. Product features and capabilities help you: Realize One Management
This single, unified solution provides wired and wireless lifecycle management, and application visibility and control. It also offers policy monitoring and troubleshooting with the Cisco Identity Services Engine (ISE) and location-based tracking of mobility devices with the Cisco Mobility Services Engine (MSE). You can manage the network, devices, applications, and users – all from one place.
Consolidate Products
Consolidate management products and reduce the number of tools required to manage the network. Managing your network using Cisco Prime Infrastructure gives you greater visibility and control, with faster deployment and troubleshooting. You can spend more time transforming your business through innovation and differentiation Manage the Network for Mobile Collaboration
Cisco Prime Infrastructure offers support for 802.11ac, correlated wired-wireless client visibility, spatial maps, Radio Frequency prediction tools, and much more. Simplify the management of the wireless infrastructure while solving problems faster and with fewer resources.
Simplify Intelligent WAN Management
Take management simplicity to the next level. Cisco Prime Infrastructure offers new, guided workflows for the Intelligent WAN and Converged Access, based on Cisco best practices. These workflows make new branch rollouts easy and fast, from setting up devices and services to automatically managing and monitoring them.
Extend Management to the Data Center
Cisco Prime Infrastructure offers fault, configuration, accounting, performance, and security (FCAPS) management with 360-degree views of Cisco Unified Computing System Series B Blade Servers and Series C Rack Servers and Cisco Nexus switches, including the Application-Centric Infrastructure–ready Cisco Nexus 9000 Series Switches. Your data center is critical to service assurance. Manage it effectively with Cisco Prime Infrastructure.
Speed Time to Value with Device and Technology Packs
Device Packs offer ongoing support of new Cisco devices and software releases. It provides parity within each device family, eliminating gaps in management operations, especially when it comes to service availability and troubleshooting. Technology Packs deliver new features between releases, accelerating time to value for high-demand functionality.
Scale Bigger
Large or global organizations often distribute network management by domain, region, or country. Cisco Prime Infrastructure Operations Center lets you visualize up to 10 Cisco Prime Infrastructure instances, scaling your management infrastructure while maintaining central visibility and control.
Citrix SD-WAN
- Unparalleled experience for SaaS, cloud, and virtual applications
- Choice of deployment options with automated connectivity to the cloud
- Integrated visibility and control over all aspects of the WAN
ControlScan Managed SIEM
Gain visibility into attacks on your environment
Basic security measures are no longer sufficient to protect your business against today’s rapidly evolving cyber threats; this reality is made glaringly evident by the constant stream of breaches reported in the news. Traditional perimeter security technologies such as firewalls and Intrusion Prevention Systems (IPS)—as well as endpoint security like anti-malware—do not provide the broad and deep visibility across your IT infrastructure needed to detect these threats. Evidence of attacks and incursions within your environment can be found in log records and machine data generated by your networked systems, security devices and applications, but how do you unlock these critical insights? Most businesses struggle with the continuous investment in technology and people required to maintain ongoing monitoring of their security posture. The ControlScan Managed SIEM service combines enterprise-class SIEM technology from the ControlScan Cyphon platform with our deep security expertise and service excellence. Comprehensive service collects, correlates, analyzes and stores log data from network infrastructure, servers and applications in order to identify and mitigate security incidents while facilitating compliance with requirements within PCI, HIPAA, GLBA, SOX and other frameworks. The secure, cloud-based Cyphon platform collects log data generated by devices such as firewalls, IPS solutions, servers, desktops and applications. Correlation logic is applied to the aggregated logs to identify potential security threats, and alerts are generated and sent in real time, on a 24x7x365 basis. ControlScan Security Analysts are on hand to support the assessment and investigation of critical alerts and to provide guidance on proper response.
Key features of the ControlScan Managed SIEM Service
- Log Collection for your entire IT infrastructure
- Event Correlation and Analysis leverages multi-sourced log data and advanced correlation rule sets to detect security incidents
- Prioritization and 24 x 7 Alerting
- 12 Months of Log Retention for compliance requirements, including PCI DSS requirement 10
- Reporting and Data Access available to you through ControlScan's web-based platform
- Advance Functionality including:
- File Integrity Monitoring (FIM)
- Custom real-time dashboards
A Unique Solution to Solving the Security Challenge.
As the leader in providing cloud-based, unified security and compliance solutions, ControlScan offers unique value through its Managed SIEM service.Deploy with ControlScan and get benefits that include the following:
Security-as-a-Service – Avoid costly, up-front investments in hardware, software and technical expertise with ControlScan’s cloud-based services. You’ll be up and running quickly and effectively with an enterprise-class, scalable solution. A solution that gets better with time – Ongoing upgrades and enhancements to the Managed SIEM service ensure the addition of new capabilities for identifying evolving attack methods. At the same time, your ControlScan security team is continually creating and tuning correlation rules for your environment to ensure maximum visibility to true, critical alerts. A staff of security experts watching your back – Only the largest organizations can afford a staff of resources maintaining security and compliance day-in and day-out. ControlScan brings extensive knowledge and experience in both areas, validated by the range of IT Security, PCI and HIPAA certifications held by our team of experts. This knowledge continues to grow as threats become more advanced. A single solution for your biggest challenges – The ControlScan Managed SIEM service delivers functionality you need on three different fronts: 1) Security 2) Compliance 3) Operations. By collecting, aggregating, correlating and analyzing data from your environment, you gain visibility to your organization’s overall security posture, support for key controls in most compliance frameworks, and assurance of the health of your networked systems.CORE Security
Introducing CORE Security
When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.CORE Base
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Quarterly
- System hardening
- Next-generation firewall
- Advanced DDoS mitigation: Standard (20 Gbps)
CORE Enterprise
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation: Enhanced (250 Gbps)
- 24/7 SIEM services
CORE Platinum
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Managed Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation
- Pro (Terabit+)
- 24/7 SIEM services
- Intrusion Prevention System (IPS)
Bolt-on CORE Security™ Services
In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:- Data loss prevention (DLP)
- Web application firewalls (WAF)
- Penetration testing
- URL filtering (Virtual Desktops only)
- Email spam filtering and antivirus (Exchange only)
- Compliance consultancy
CyBot
Save time & money
Increase security by focusing on remediating vulnerabilities that are a part of a validated attack path to a business process or critical assetKey features:
- Creates actionable insights based on critical vulnerabilities that threaten your business process for immediate alerts and remediation with one click
- Continuous silent vulnerability scanning on all IP based devices on premise or in the cloud
- Automatically detects critical assets and finds how hackers could reach and threaten them, no human involvement required.
- Cronus is certified for Penetration Testing by CREST
- Help comply with GDPR –require regular pen testing, vulnerability management and greatly reduces the risk of breach to your sensitive data.
Which CyBot is right for me?
CyBot is a next-generation vulnerability management tool as well as the world’s first Automated pen testing solution, that continuously showcases validated, global, multi-vector, Attack Path Scenarios ™ (APS), so you can focus your time and resources on those vulnerabilities that threaten your critical assets and business processes. CyBot has one core engine: CyBot Pro, plus two additional management consoles. One for Enterprises and one for MSSPs. CyBot Pro is the workhorse of the product suite. It is a patented autonomous machine-based penetration test which initially scans the networks, its assets, its vulnerabilities and then takes the next step to map out and validate all the routes a hacker could take to reach your critical assets and business processes. Much like the process a human penetration tester would follow, but continuously and at a much larger scale and scope. CyBot Enterprise manages several CyBot Pros. This is great for larger organizations with global networks who wish to gain insights on global Attack Path Scenarios ™ between their branches, each using a different CyBot machine. CyBot Enterprise will aggregate information from all CyBot Pros for in-depth global insights on cyber threats to your business processes. CyBot MSSP provides large managed security service providers with full control of their Enterprise customers, each with their various CyBot Enterprise and CyBot Pro accounts. Schedule their scans, get alerts to your SIEM and much moreCyrebro
What Makes CYREBRO a Smart SOC?
CyberHat’s unique cyber security readiness assessment is based on years of practical offensive expertise. Company designed and built a unique, on-site, professional assessment that provides clear and tangible insights of an organizations cyber defense capabilities. They evaluate a client’s security readiness and provide a roadmap of remedial actions which address three core elements:- Resilience
- Response
- Recovery abilities
- Technology Agnostic
- Hacker Point of View
- SIEM Optimization
- Seamless Integration
- Incident Response
- Forensic Investigation
- Threat Intelligence
CYREBRO Business Models
- CYREBRO Core. Helping clients utilize their existing technologies
- CYREBRO One. A full turnkey solution that gets you up and running quickly and professionally
- CYREBRO X. Enabling SMBs' the most professional managed SOC with fortune 100 grade
DefenseStorm GRID
Let DefenseGRID experts keep watch on your behalf
- Threat Ready Active Compliance (TRAC) Team is staffed by security experts that will help monitor your network and alert you when they see a potential threat
- A structured and supported approach to on-boarding
- 24/7 network monitoring
- TRAC can make the difference between a security fire drill and a full system breach
- Frequent, hassle-free updates without additional cost, software downloads or hardware changes
- Pricing based on your asset size, not the amount of data ingested, so you can cover everything
- Speed and power without the high cost of data centers, hardware and hiring additional IT resource
Key Features
- Scalability that evolves with financial institution needs. Transforms complex and unstructured security event data from disparate systems into meaningful, actionable information
- Community intelligence. A community of financial institutions and cybersecurity experts. Leverage community knowledge for progressively smarter cybersecurity & cybercompliance practices. Learn what like-minded thinkers have to say about keeping financial institutions safe and sound. Access our Knowledge Center for best practices and DefenseStorm GRID updates.
- The DefenseStorm GRID: Co-Managed Threat-Ready Cybersecurity + Active Compliance. Your team and DefenseStorm’s TRAC (Threat Ready Active Compliance). Team use the DefenseStorm GRID together.Be as involved as you’d like in day-to-day activities. The TRAC Team carefully curates the threat feeds and triggers most relevant to banks and credit unions to meet compliance & security needs
- Configured for you. TRAC leverages the DefenseStorm GRID library to create cybersecurity triggers specific to your bank or credit union network and policies.
- See everything, prioritize what matters most. TRAC curates triggers to prioritize the most important indicators of compromise. Machine Learning and Rich Context help reduce the number of alerts and false positives while also increasing relevancy.
- The visibility and understanding you need. You see the same console and dashboards our TRAC Team uses, which facilitates co-managed coverage and efficiency.
- Cybersecurity & cybercompliance in one real time system of record. DefenseStorm GRID serves as your system of record for your cybersecurity and cybercompliance postures in real time, all the time. Task Schedules, workflows, audit trails and evidentiary proof reflect industry regulations as well as your own policies.
- Slash reporting time, even for audits and examinations. The DefenseStorm GRID continuously collects all compliance-related evidence and automatically generates corresponding reports to prove compliance to internal and external stakeholders as well as regulators.
- Guidance to align risk with cybersecurity maturity. The DefenseStorm GRID continuously guides you to align your cybersecurity risk with your Cybersecurity Maturity Level. Your Inherent Risk Profile and Maturity Levels will change as threats, vulnerabilities and operating environments change.
DXC Security Platform
- Correlation of information on incidents and vulnerabilities to the configuration management database (CMDB) to understand the business criticality, allowing incident responders to work on the most important issues first
- Workflows that follow National Institute of Standards and Technology best practices for computer/IT security incident handling (NIST SP 800-61r2)
- Automated post-incident review report that eliminates the need for manual post-mortem reports
- Automatic triggering of a patching process, configuration changes or other standard workflows, by specific types of security incidents and vulnerabilities
- At-a-glance dashboards that show executives and analysts the exact status of their overall security posture as well as enable drill-down to a specific incident
- Indicators of compromise automatically linked with security incidents and vulnerabilities, streamlining and automating the manual process of threat investigation and incident triage
- Chat capabilities
- Content and knowledge management
- Task management
Through increased automation and improved collaboration, security and IT teams can work more closely to hold the entire organization accountable for solving issues quickly. These streamlined processes can help expand the capacity of security analysts and response teams to respond more efficiently to attacks and incidents. As a result, the DXC Security Platform will help reduce overall risks enterprise-wide.
Comprehensive support services
DXC offers a complete array of managed security services for cloud, traditional data center, endpoint, identity and network management. DXC’s Security Platform can be integrated with DXC’s services:- 24x7 SOCs for continuous monitoring and management of incidents and vulnerabilities
- Cyber assurance for account and security service management
- Incident management team for response to user- and machine generated incidents
- Managed SIEM
- Managed vulnerability assessment
- Global threat intelligence
- Client ITSM environments, if needed (at additional cost for integration)
- Service Desk, if needed (at additional cost)
Why DXC?
With 40 years of experience in information security, DXC is one of the world’s few companies that provide end-to-end services to monitor and safeguard systems — from strategic consulting and technical assessments to managed security services.Key features:
Security Services Catalog and User Ticketing. Allows security teams to manage and respond to user-generated security incidents. Handles incidents raised by users over the telephone, email or the security catalog. Integrates with threat intelligence portal. Requests automation among IT, end users and security teams
Security Information and Event Management (SIEM) Integration. Allows security teams to test, execute and audit security response plans. Handles network- and non-network-related incidents. Integrates with threat intelligence portal. Requests automation among IT, end users and security team. Predefines workflows for common security incidents
Vulnerability Management. Manages vulnerability investigations and aligns remediation activities. Integrates with the National Vulnerability Database. Includes third-party integration with market-leading vulnerability identification solutions. Seamlessly integrates with incident response tasks, change requests and problem management. Predefines workflows for common security vulnerability types
Ecessa SD-WAN
- We help you differentiate from direct
- We add incremental revenue streams and increase your margins with new and existing partners
- We can be your technical experts on SD-WAN helping you be the value-added partner
- We offer a variety of SD-WAN solutions with prices as low as $50/month
- Voice, video and VDI environments
- SMB/SME with 1 to 500 sites are in Ecessa’s sweet spot
- Regulated markets where data must be controlled from end-to-end, e.g. medical, banking/finance
- Customers who need flexible networks
- Bandwidth and carrier agnostic
- Ecessa offers 3 unique, and upgradeable, platforms that can be mixed and matched to create the perfect solution for any environment
- Ecessa has products that range from 60 Mbps to 20 Gbps
- Easy to consume with both CapEx and OpEx pricing options
- Ecessa is a premise-based solution which means all the intelligence sits on the device
- Cloud-based SD-WAN can introduce issues with security, oversubscription, and latency
ePlus Managed Security Services
- SOC as a Service
- Security Log Monitoring and Management
- Security Device and Vulnerability Management
- Managed SIEM
- Managed Detection and Response
With ePlus on your side, you’ll be able to assess and protect your IT footprint, better meet regulatory compliance, benefit from a consistent and reliable service provided by highly-skilled and specialized staff, and leverage powerful automated response solutions.
F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData
Forcepoint Secure Enterprise SD-WAN
Fortinet FortiGate SD-WAN
- Best WAN Edge Price/Performance
- WAN Path Controller with Remediation
- Fastest Application Identification and Steering
- Advance Routing Capabilities and WAN Optimization
Genesys PureConnect (formerly Interaction Center Platform)
Ivanti Environment Manager
Achieve breakneck logon speeds and a personalized user experience, delivered by IT with calm and tranquility. Outstanding User Experience Ensure a Consistent User Workspace Reward users with a familiar workspace regardless of how their desktop is composed and delivered yet ensure conditional settings can be applied—dependent on the user’s context—to meet security and compliance mandates. Seamless Migration to Windows 10
Remove the IT complexity and user upheaval typically associated with Windows 10 migration and enable fluid movement of user settings between physical, virtual, and cloud desktops. Release the Full Power of Office 365 Deliver the ultimate Office 365 experience by roaming offline caches in non-persistent VDI and RD Session Host environments. Boost Productivity Accelerate logon times and increase productivity while liberating IT from the shackles of slow and complex desktop configuration tools, such as logon scripts or Group Policy. User Personalization
- Automate the management of application and OS content, in real time, to remove the complexity associated with managing user profile settings.
- Stream personal settings, on-demand, to ensure rapid logon times.
- Easily rollback personal settings in the event of profile inconsistencies or corruption.
- Self-service tools empower users to be self-sufficient and help reduce the burden on the IT support desk.
- Apply desktop configuration actions simultaneously to speed up logon times.
- Ease the strain on the logon process by setting desktop-configuration actions to apply on-demand, only when needed.
- Complement built-in desktop configuration actions and conditions by creating custom items to cater to more complex, bespoke environments.
- Simplify desktop configuration for IT Teams by removing the complexity of managing and maintaining logon scripts or GPO inheritance rules.
Provide users with a tailored desktop dependent on how they log on, where they log on from, and on which device.
Context-aware conditions enable IT teams to configure custom desktop environments easily to accommodate security, compliance, and ease of use.
A set of rules can be combined easily to deliver Boolean logic without any complexity, enabling IT to satisfy any custom requirements.
Desktop configuration actions can be set to run simultaneously, to speed up processing, or consecutively, to provide different levels of dependency. This provides a simple-to-use alternative to logon scripts and GPOs, removing complexity for IT teams and improving the user experience. Where you have existing GPO settings, these can be easily imported and applied to desktops, significantly reducing your administration overhead and setup time.
Key Feature: Effortless User Migration
Simplify migration projects with Environment Manager’s unique User Personalization capabilities.
Automatically capture and roam users’ personal settings easily across distinct operating systems and between physical, virtual, and cloud-based desktops.
Built-in templates provide out-of-the-box configuration settings for a host of common applications. Self-service tools let users roll back their personal settings on a per-application or operating systemcomponent basis in the event of profile corruption or inconsistencies, to help reduce IT support calls.
Personalization Analysis Tools ease management of user settings and a web-based Personalization Operations Console empowers IT to perform multi-user operations such as deleting, creating, or editing profile setting backups.
Major Benefits
- Deliver a superior user experience
- Reduce the IT complexity of desktop configuration
- Ease Windows 10 migrations
- Enable faster adoption of cloud services
- Provide an optimized Office 365 experience in nonpersistent desktop environments
- Proven enterprise scalability
- Built-in DR and failover for business continuity
Ivanti License Optimizer for Clients
Determine assets in use and understand where you can optimize your investments. Accurate information about your owned assets delivered at the right time drives confidence in data and fosters informed decision-making. Close the Vendor Visibility Gap with B2B Connectors Eliminate spreadsheets and gain vendor visibility from the moment you acquire a new asset. Business-to-business (B2B) connectors aggregate manufacturer, vendor, and reseller data such as purchase order numbers, device types, and location mapping. Collect this information automatically from a continually growing number of connectors like Apple, Dell, HP, IBM, Lenovo, Lexmark, Verizon, CDW, En Pointe, and more. Standardize Asset Naming with Data Normalization Ivanti License Optimizer for Clients employs a normalization and rules engine that applies standard naming conventions automatically to collected asset data and reporting fields. This eliminates reporting and management headaches associated with varied and complex vendor naming schemes. Reclaim Your Unused Software Licenses Gain visibility through software monitoring and comprehend clearly what’s in use, when it was last used, and how long it was deployed to determine appropriate reclamation processes and policies. You maximize software licenses and enable users to make license requests for authorized software. No over-spending required. Gain Control Over Software Compliance Software audits are increasingly more common. Software not purchased, maintained, or licensed correctly places organizations at risk of non-compliance. The incurred penalties and unexpected true-up costs can drain financial resources. Ivanti License Optimizer for Clients delivers detailed insight into your current software license usage so you can negotiate more favorable licensing deals, eliminate over-buying of licenses, minimize rogue purchases, and avoid fines associated with failed audits. Optimize Your Software Assets Making the most of your software assets is challenging, especially when dealing with licensing structures that are constantly changed and updated. Now you can maximize your software spend and avoid the financial risk of noncompliance by matching your usage data against license entitlements with support for the most advanced licensing regimes.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.