View

Sorting

Products found: 346

logo
Offer a reference bonus
1.00

A10 Thunder® ADC

ADVANCED SERVER LOAD BALANCING Complete full-proxy L4-7 load balancing with customizable server health checks and aFleX® L7 scripting. GLOBAL SERVER LOAD BALANCING (GSLB) Extend load balancing on a global basis to enable worldwide business continuity with faster, localized server responses. APPLICATION DELIVERY PARTITIONS (ADP) 1,000-plus partitions offer the highest-density, multi-tenant solutions for customizable policies and appliance consolidation. SSL OFFLOAD WITH PFS AND ECC Perfect Forward Secrecy with a full cipher suite, including Elliptic Curve, provide SSL offload at the industry’s highest levels. APPLICATION ACCELERATION AND OPTIMIZATION Caching, compression and TCP reuse combine to expedite content transfer for enhanced app performance. WEB AND DNS PROTECTION Secure services and meet compliance targets better with single sign-on, web and DNS firewalls, and DDoS protection. PER-APPLICATION ANALYTICS Integrate with the A10 Harmony™ Controller for visibility into user experiences, traffic profiles and health checks to improve performance. AXAPI® REST-BASED PROGRAMMABILITY Configure all features with 100 percent API coverage and enable third-party management.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
5
4
logo
Offer a reference bonus
1.00

Adnovum nevisProxy

nevisProxy is a secure reverse proxy with integrated web application firewall (WAF). It acts as a central upstream entry point for web traffic to integrated online applications. nevisProxy controls user access and protects sensitive data, applications, services, and systems from internal and external threats.

Features and Tasks:

  • Protection against denial-of-service attacks
  • SSL termination (encryption and acceleration)
  • Session and timeout handling (single session)
  • SSO (single signon)
  • Initialization of multi-step authentication
  • Authentication in cooperation with nevisAuth
  • Propagation of user identities incl. additional information (roles) in secure token (SAML, JWT, Nevis SecToken, HTTP Header etc.)
  • Role-based authorization
  • Cookie caching
  • Renegotiation of client session association
  • Caching and data compression
  • Content inspection and validation (HTML, XML, JSON etc.)
  • Input validation (black- and whitelists with self-learning)
  • Virtual patching enables rapid reaction in case of serious security threats
  • URL signing and encryption
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
19
logo
Offer a reference bonus
1.00

Airlock Web Application Firewall

The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance, security for online banking or protection for eCommerce: Airlock WAF will upgrade security for your internet applications – a permanent solution with a host of well thought-out functionalities. Thanks to Airlock WAF, businesses can exploit the potential of the internet without jeopardizing the security and availability of their web applications and services. Each access is systematically monitored and filtered at every level. Used in conjunction with an authentication solution such as Airlock Login or IAM, Airlock WAF can force upstream user authentication and authorization. This allows a uniform, central single sign-on infrastructure. All important information is also made available via monitoring and reporting functions. Airlock WAF is the only web application security solution on the market that provides superlative end-to-end protection for complex web environments. Airlock WAF - The main features
  • Secure Reverse Proxy
  • Central Checkpoint
  • Filtering
  • API Security
  • Dynamic Whitelisting
  • Central Security Hub
  • High Availability and Performance
Airlock WAF is also available as a hardware appliance With the Airlock WAF hardware appliance, setup and going live will be even easier than today. Of course, hardware appliances can be connected to build a failover cluster with active session synchronization.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
13
5
logo
Offer a reference bonus
1.00

Akamai Kona Web Application Firewall

Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats.
With Kona WAF you can: 
  • Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.
  • Ensure high performance even during attacks thanks to Akamai’s globally architecture.
  • Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.
  • Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.
Key capabilities of Kona WAF
  • Kona WAF provides comprehensive capabilities to protect against application-layer attacks. 
  • Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.
  • Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.
  • Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.
  • Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.
  • Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
8
10
logo
Offer a reference bonus
0.00

All-in-One PC Lenovo ThinkCentre M Series

Productivity enhancers Tackle spreadsheets, multiple presentations, and photo-editing with ease. With powerful Intel Core processors, the latest DDR4 computer memory, and SSD storage options, each ThinkCentre AIO is a powerful performer. Load and transfer files at lightning speed — essential for time-critical applications that require a large memory capacity or fast storage. Get things done — quickly and easily. Adapts to you Versatile stands give you the freedom to use your display at any angle with tilt, height, and swivel functionality that can adapt to a range of working styles — whether sitting at a desk, or standing to serve customers, you’ll always have the best view. ThinkCentre M920z AIO ThinkCentre M820z AIO
... Learn more
ROI-calculator
Configurator
ROI-
-
4
17
logo
Offer a reference bonus
2.00

Amazon Elastic Load Balancing (ELB)

Elastic Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones. Elastic Load Balancing offers three types of load balancers that all feature the high availability, automatic scaling, and robust security necessary to make your applications fault tolerant. Elastic Load Balancing Products Application Load Balancer Application Load Balancer is best suited for load balancing of HTTP and HTTPS traffic and provides advanced request routing targeted at the delivery of modern application architectures, including microservices and containers. Operating at the individual request level (Layer 7), Application Load Balancer routes traffic to targets within Amazon Virtual Private Cloud (Amazon VPC) based on the content of the request. Network Load Balancer Network Load Balancer is best suited for load balancing of TCP traffic where extreme performance is required. Operating at the connection level (Layer 4), Network Load Balancer routes traffic to targets within Amazon Virtual Private Cloud (Amazon VPC) and is capable of handling millions of requests per second while maintaining ultra-low latencies. Network Load Balancer is also optimized to handle sudden and volatile traffic patterns. Classic Load Balancer Classic Load Balancer provides basic load balancing across multiple Amazon EC2 instances and operates at both the request level and connection level. Classic Load Balancer is intended for applications that were built within the EC2-Classic network. BENEFITS Highly Available Elastic Load Balancing automatically distributes incoming traffic across multiple targets – Amazon EC2 instances, containers, and IP addresses – in multiple Availability Zones and ensures only healthy targets receive traffic. Elastic Load Balancing can also load balance across a Region, routing traffic to healthy targets in different Availability Zones. Secure Elastic Load Balancing works with Amazon Virtual Private Cloud (VPC) to provide robust security features, including integrated certificate management and SSL decryption. Together, they give you the flexibility to centrally manage SSL settings and offload CPU intensive workloads from your applications.                        Elastic Elastic Load Balancing is capable of handling rapid changes in network traffic patterns. Additionally, deep integration with Auto Scaling ensures sufficient application capacity to meet varying levels of application load without requiring manual intervention.         Flexible Elastic Load Balancing also allows you to use IP addresses to route requests to application targets. This offers you flexibility in how you virtualize your application targets, allowing you to host more applications on the same instance. This also enables these applications to have individual security groups and use the same network port to further simplify inter-application communication in microservices based architecture. Robust Monitoring and Auditing Elastic Load Balancing allows you to monitor your applications and their performance in real time with Amazon CloudWatch metrics, logging, and request tracing. This improves visibility into the behavior of your applications, uncovering issues and identifying performance bottlenecks in your application stack at the granularity of an individual request. Hybrid Load Balancing Elastic Load Balancing offers ability to load balance across AWS and on-premises resources using the same load balancer. This makes it easy for you to migrate, burst, or failover on-premises applications to the cloud.
... Learn more
ROI-calculator
Configurator
ROI-
-
6
18
logo
Offer a reference bonus
0.00

Ampex TuffServ

Ampex Data Systems is a legendary supplier of ruggedized airborne recording and network data acquisition systems used in flight test, ISR, and tactical mission applications. By using innovative hardware and software designed specifically to meet the performance needs of the marketplace, Ampex provides its customers with product solutions for their most demanding applications across the entire pricing spectrum - TuffServ 282, TuffServ 480GE, TuffServ 480v2, TuffServ 540, TuffServ 640, TuffServ 641, TuffServ® 481, TuffServ® TS 485. TuffServ®Series. Employing a common architecture found throughout the TuffServ offerings all products advance performance and scalability to an entirely new level. With blazing read/write speeds of up 1GB/sec, 12.8TB of removable solid-statememory, and dual 10Gbit optical Ethernet ports, TuffServ offers unparalleled performance for a wide variety of airborne and mobile applications. They addresses key issues encountered when attempting to take products designed for data center use into aerospace environments: cooling, removable storage and the management of internal cables in high-vibration environments.7
... Learn more
-
ROI-calculator
Configurator
ROI-
-
8
11
logo
Offer a reference bonus
1.70

APC Aquaflair TRAC-TRAF-TRAH

Air-cooled chillers, free-cooling chillers and heat pumps with scroll compressors and R410A refrigerant. • All-in-one units, completely configurable for easy design and installation, continuous and quiet operations in multiple applications and environmental conditions. • Aquaflair chillers are designed for Tier III and IV data center installations
... Learn more
-
ROI-calculator
Configurator
ROI-
-
3
1
logo
Offer a reference bonus
1.70

APC Back-UPS Pro

The Back-UPS Pro family offers guaranteed power protection for high performance computer systems, routers/modems, external storage devices, game consoles and other electronics in your home or business. These UPSs supply electronics with abundant battery backup during outages and stabilize unsafe voltage levels. They also provide power protection from damaging surges and spikes, and allow the use of management software so you get the most out of your UPS. Premium features of this family may include Automatic Voltage Regulation (AVR), an LCD display, Smart Outlets, energy saving functions that reduce electricity use, network manageability, Watchdog, or configurable outlets. Together with the rest of the Back-UPS Pro's standard features, they are the perfect choice to protect your data and keep your system available.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
16
16
logo
Offer a reference bonus
0.00

APC Smart-UPS VT

10kVA to 40kVA
Smart-UPS® VT offers centralized 3 Phase UPS power protection with the reliability of the award winning Smart-UPS family. Ideal for small data centers, large retail stores, regional offices, and dense power requirements, the Smart-UPS VT includes dual-mains input, automatic and maintenance bypasses, and scalable runtime with hot-swappable batteries for increased availability. The rack mounted version maximizes valuable floor space by incorporating UPS, power distribution, and additional battery capacity in a single rack. Low cost of ownership is achieved through best-in-class efficiency and a reduction in rating of electrical infrastructure - wires, transformers, and generators due the Smart-UPS VT's Soft Start feature. BENEFITS Protection
  • Ensures the product has been tested and approved to work safely with the connected service provider equipment and within the specified environment.
  • Provides temporary battery power when the utility power is out.
  • Gives higher application availability by correcting poor frequency and voltage conditions without using the battery.
Sustainability
  • Ensures that UPSs sold in the EU are highly efficient
Availability
  • Delivers higher availability through redundant batteries.
  • Allows additional run time to be quickly added as needed.
  • Increases availability by allowing the UPS to be connected to two separate power sources.
  • Supplies utility power to the connected loads in the event of a UPS power overload or fault.
  • Ensures clean, uninterrupted power to protected equipment when generator power is used.
Serviceability
  • Enables fast battery replacement, lowering Mean Time to Repair (MTTR).
  • Enables pre-installation UPS staging and testing and faster installation.
  • Periodic battery self-test ensures early detection of a battery that needs to be replaced.
  • Provides fast serviceability and reduced maintenance requirements via self-diagnosing, field-replaceable modules.
Manageability
  • Quickly understand unit and power status with visual indicators.
  • Ensures compatibility with different input frequencies.
  • Provides notification of changing utility power and UPS power conditions
  • Provides remote power management of the UPS over the network.
  • Enables centralized management via the APC InfraStruXure Manager.
  • Alpha-Numeric Display which displays system parameters and alarms.
  • Customize UPS capabilities with management cards.
Total Cost of Ownership
  • Maximizes battery performance, life, and reliability through intelligent, precision charging.
  • Reduces installation costs by eliminating the need for an external mechanical bypass.
  • Prolongs battery life by regulating the charge voltage according to battery temperature.
  • Minimizes installation costs by enabling the use of smaller generators and cabling.
... Learn more
ROI-calculator
Configurator
ROI-
-
3
2
logo
Offer a reference bonus
1.70

APC Symmetra

APC Symmetra is a highly available single phase UPS features redundant and scalable double-conversion on-line power protection. Engineered to deliver the highest level of business continuity possible, Symmetra's modular, redundant architecture can scale power and run time as demand increases or when higher levels of availability are required. Integrated network manageability provides real time status updates of UPS health and environmental conditions. Hot-swappable, user replaceable power, battery, and intelligence modules enables low MTTR and ease of service. Symmetra's modular design provides redundant power in a single chassis for business-critical applications in server rooms and network closets.
... Learn more
ROI-calculator
Configurator
ROI-
-
20
14
logo
Offer a reference bonus
0.00

Arbit Data Diode

The Arbit Data Diode moves data from an insecure network to a secure network ensuring that no data is able to flow back. This is handles by the physical principle of the data diode. The Arbit Data Diode is a physical data diode that eliminates the threat of remote data stealing by establishing a physically secure one-way connection with a single fiber-optic cable. The transmission is handled by two dedicated servers. The sending server is called a pitcher and the receiving server is called a catcher. No data can be transported from the receiving network to the transmitting network. Therefore, the Arbit Data Diode is just as safe as manual data transfer, but offers the same convenience as a normal network connection.

The Arbit Data Diode has the following features:
  • More hardware configurations available
  • Maximum file size limited only by available disk space
  • Based on gigabit network interfaces
  • Transports all file types and emails with full transaction control
  • Unlimited number of data channels
  • Data channel priority (on transaction basis)
  • Supports up to 24 streaming channels (video, radio, etc.)
  • Back Pressure in case of critical diskspace
  • Safe points in case of increased data flow
  • Notifications by email: Required retransmissions, Daily operational statistics, Total count and size of transactions within last 24h.
  • Operated by web-interfaces
  • No daily maintenance
  • Software based on hardened Linux
  • Support Supervisory Control and Data Acquisition (SCADA) networks
  • Support Industrial Control Systems (ICS)

SUPPORTED PROTOCOLS
  • Mail (SMTP)
  • Simple file transfer (FTP, SFTP)
  • Windows share mapping (SMB)
  • Time synchronization (NTP)
  • HTTP/HTTPS forwarding
  • Streaming (UDP/TCP) 
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
20
17
logo
Offer a reference bonus
1.40

Arbor APS

• DDoS protection from active botnets • DDoS protection from active DDoS campaigns based on IP reputation • Advanced web crawler service • GeoIP tracking • Domain and IP reputation to block threats APS enhances your overall protection by using Cloud Signaling™ to connect local protection with cloud-based DDoS services. With Cloud Signaling, APS automatically alerts upstream service providers, such as your ISP or Arbor CloudSM, when larger attacks threaten availability. This allows for a faster time to mitigate attacks. 
... Learn more
-
ROI-calculator
Configurator
ROI-
-
9
7
logo
Offer a reference bonus
1.00

Asus Pro B Advanced

Asus wants to meet the growing expectations of business customers with new features and more performance for the AsusPro Advanced B. The basics are covered with a ULV processor, sufficient memory and a fast SSD.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
17
logo
Offer a reference bonus
1.70

Asus ZenBook UX410UQ

Мир цвета с технологией ASUS Splendid
Разработанная специалистами ASUS технология Splendid позволяет быстро настраивать параметры дисплея в соответствии с текущими задачами и условиями, чтобы получить максимально качественное изображение. Она предлагает выбрать один из нескольких предустановленных режимов, каждый из которых оптимизирован под определенные приложения (фильмы, работа с текстом и т.д). В специальном режиме Eye Care реализована фильтрация синей составляющей видимого спектра для повышения комфорта при чтении. Ноутбук оснащен качественной матрицей с разрешением Full HD (1920x1080), которая дает возможность выводить изображение с высоким уровнем детализации.

Технология ASUS Eye Care для комфорта ваших глаз
Короткие электромагнитные волны, соответствующие пурпурно-синему краю спектра, обладают большей энергией, поэтому оказывают более сильный эффект на сетчатку глаза. В режиме ASUS Eye Care реализована фильтрация этой составляющей видимого спектра для повышения комфорта при чтении и снижения вредного влияния синего света на зрение.

Очень тонкий и элегантный
ZenBook UX410 — образец тонкого и легкого дизайна. Толщина его профиля составляет лишь 18.95 мм, а чтобы сделать корпус устройства легче и гарантировать его прочность, для производства был выбран специальный алюминиевый сплав. Процесс изготовления корпуса состоит из нескольких десятков этапов, на каждом из которых достигается высокая точность операций.

Высокоскоростной интерфейс USB Type C
Ноутбук оборудован разъемами USB 3.1 Type C и HDMI, а также кардридером SD для полной совместимости с широким спектром периферийных устройств. Компактный разъем USB Type C имеет специальную конструкцию, которая позволяет подключать USB-кабель к ноутбуку любой стороной. При этом этот порт работает на скорости до 5 Гбит/с, то есть в 10 раз быстрее, чем USB 2.0. Это означает быструю передачу больших объемов информации, например видеофайлов.

Эргономичная клавиатура с подсветкой
Полноразмерная клавиатура ZenBook UX410 оборудована подсветкой и отличается оптимальным ходом клавиш (1.6 мм) для максимально комфортной работы.

Высококачественный звук
Разработанная специалистами ASUS технология SonicMaster, представляющая собой комплекс аппаратных и программных средств улучшения качества звука.
Подробнее: http://rozetka.com.ua/asus_zenbook_ux410uq_gv046r/p14317814/characteristics/

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
3
logo
Offer a reference bonus
1.00

Avocent Matrix Digital High Performance KVM System

The Avocent® Matrix Digital High Performance KVM system provides a highly scalable and configurable way to connect hundreds of users to thousands of servers and workstation equipment in a secure, real-time manner. By providing high definition video, audio, and exceptional USB performance is ideal for control room and user extension applications in Government, Broadcast, Post Production, Enterprise Data Centers, Industrial, and Transportation environments.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
20
14
logo
Offer a reference bonus
0.00

AVTOR SecureToken-337F

The SecureToken-337F electronic key is two devices in one case: the Secure Token-337 electronic key and the FLASH memory with logical disks for storing any user data. “SecureToken-337F” is fully compatible with the “SecureToken-337” electronic key; it is used for secure storage and use of electronic digital signature keys (EDS) of the tax service of Ukraine, keys of ACSK of state and other organizations, in banking and corporate systems, Internet banking and etc. It performs the functions of the formation and verification of a digital signature, encryption, authentication, storage of secret (key) information. SecureToken-337F can be used to store any user data with protection against unauthorized access. It supports two types of disk arrays - open and protected, with a total capacity of up to 32 GB. All data on a secure medium is stored in an encrypted form. Key storage and cryptographic operations are implemented in the NXP Semiconductors P5CC037 smart chip, which is used in SecureToken-337. SecureToken-337F supports the following operating systems: Windows XP/2003/2008/Vista/7/8/10, Linux, Mac OS, Android. The SecureToken-337F electronic key is supplied with the CryptoFlash software.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
15
3
logo
Offer a reference bonus
2.40

AWS Snowball Edge

AWS Snowball Edge is a data migration and edge computing device that comes in two options. Snowball Edge Storage Optimized provides both block storage and Amazon S3-compatible object storage, and 24 vCPUs. It is well suited for local storage and large scale-data transfer. Snowball Edge Compute Optimized provides 52 vCPUs, block and object storage, and an optional GPU for use cases such as advanced machine learning and full motion video analysis in disconnected environments. Customers can use these two options for data collection, machine learning and processing, and storage in environments with intermittent connectivity (such as manufacturing, industrial, and transportation) or in extremely remote locations (such as military or maritime operations) before shipping it back to AWS. These devices may also be rack mounted and clustered together to build larger, temporary installations. Snowball Edge supports specific Amazon EC2 instance types as well as AWS Lambda functions, so customers may develop and test in AWS then deploy applications on devices in remote locations to collect, pre-process, and return the data. Common use cases include data migration, data transport, image collation, IoT sensor stream capture, and machine learning. BENEFITS EASY DATA MOVEMENT Snowball Edge moves terabytes of data in about a week. Customers use it to move things like databases, backups, archives, healthcare records, analytics datasets, IoT sensor data and media content, especially when network conditions prevent realistic timelines for transferring large amounts of data both into and out of AWS. SIMPLE TO USE Jobs are created in the AWS Management Console. Once a job is created, AWS automatically ships a pre-provisioned Snowball Edge device to your location. When you receive the device, simply attach it to your local network and connect your applications. Once the device is ready to be returned, the E Ink shipping label automatically updates and your freight carrier transports it to the correct AWS facility where the upload begins. Job status can be tracked via Amazon SNS generated text or email messages or directly in the Console. PROCESS & ANALYZE DATA LOCALLY Run EC2 AMIs and deploy AWS Lambda code on Snowball Edge to run local processing or analysis with machine learning or other applications. Developers and administrators can run applications directly on the device as a consistent AWS environment without network connectivity. This capability helps customers develop their machine learning and analysis tools and test them in the cloud but operate them in locations with limited or non-existent network connections before shipping the data back to AWS. Snowball Edge can capture the data from the remote site and any additional unrecognized data so the machine learning models can be refined and propagated. STAND-ALONE STORAGE Snowball Edge devices can provide local storage to existing on-premises applications through a file sharing protocol (NFS) or object storage interface (the S3 API). Additionally, you can use on-board block storage volumes for applications running on Amazon EC2 instances on the Snowball Edge. You can also cluster Snowball Edge devices together into a single, larger, storage tier with increased durability. If a Snowball Edge needs to be replaced, it can be removed from the cluster and replaced with a new Snowball Edge. SECURE Snowball Edge devices use tamper-evident enclosures, 256-bit encryption, and industry-standard Trusted Platform Modules (TPM) designed to ensure both security and full chain-of-custody for your data. Encryption keys are managed with the AWS Key Management Service (KMS) and they are never stored on the device. SCALABLE Snowball Edge devices can transport multiple terabytes of data and multiple devices can be used in parallel or clustered together to transfer petabytes of data into or out of AWS. Snowball Edge is currently available in select regions and your location will be verified once you create a job in the AWS Management Console.
... Learn more
ROI-calculator
Configurator
ROI-
-
2
13
logo
Offer a reference bonus
2.00

AWS WAF - Web Application Firewall

AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules. BENEFITS INCREASED PROTECTION AGAINST WEB ATTACKS AWS WAF protects web applications from attacks by filtering traffic based on rules that you create. For example, you can filter web requests based on IP addresses, HTTP headers, HTTP body, or URI strings, which allows you to block common attack patterns, such as SQL injection or cross-site scripting. SECURITY INTEGRATED WITH HOW YOU DEVELOP APPLICATIONS Every feature in AWS WAF can be configured using either the AWS WAF API or the AWS Management Console. This allows you to define application-specific rules that increase web security as you develop your application. This lets you put web security at multiple points in the development chain, from the hands of the developer initially writing code, to the DevOps engineer deploying software, to the security experts conducting an audit. EASE OF DEPLOYMENT & MAINTENANCE AWS WAF is easy to deploy and protect application(s) deployed on either Amazon CloudFront as part of your CDN solution, the Application Load Balancer that fronts all your origin servers, or Amazon API Gateway for your APIs. There is no additional software to deploy except to enable AWS WAF on the right resource. You can centrally define your rules, and reuse them across all the web applications that you need to protect. IMPROVED WEB TRAFFIC VISIBILITY You can set up AWS WAF to just monitor requests that match your filter criteria. AWS WAF gives near real-time visibility into your web traffic, which you can use to create new rules or alerts in Amazon CloudWatch. COST EFFECTIVE WEB APPLICATION PROTECTION With AWS WAF you pay only for what you use. AWS WAF provides a customizable, self-service offering, and pricing is based on how many rules you deploy and how many web requests your web application receives. There are no minimum fees and no upfront commitments. ENHANCED SECURITY WITH MANAGED RULES With Managed Rules for AWS WAF, you can quickly get started and protect your web application or APIs against common threats such as OWASP Top 10 security risks, threats specific to Content Management Systems (CMS), or emerging Common Vulnerabilities and Exposures (CVE). AWS security sellers will automatically update the managed rules for you as new exploits and bad actors emerge, so that you can spend more time building rather than managing security rules.


 
... Learn more
-
ROI-calculator
ROI-
-
10
0
logo
Offer a reference bonus
1.40

AXIS F

AXIS F Series - Flexible cameras that let you see more Flexible, rugged, discreet design 1-channel and 4-channel main units Choice of indoor, outdoor, standard, varifocal, pinhole, fisheye and dome sensor units Wide Dynamic Range and Axis’ Zipstream technology Two-way audio, input/output ports Local storage, PoE, 8-28 V DC AXIS F Series Discreet cameras for wide application AXIS F Series offers flexible, high-performance HDTV cameras for extremely discreet indoor, outdoor and in-vehicle surveillance applications. They are ideal for ATMs (automated teller machines), banks, stores, hotels, as well as rugged environments such as emergency vehicles, buses, trams and trucks. Divided concept AXIS F Series is based on a divided network camera concept, where the camera is split into a sensor unit—made up of a lens and image sensor with a cable—and a main unit, which is the body of a camera. The divided concept enables flexibility in the choice of hardware, as well as in the installation. The small sensor unit can be installed discreetly in tight places, while the long cable from the sensor unit to the main unit provides the flexibility to place the main unit where there is space. The main or sensor unit can be easily relocated or changed after the initial installation, giving users additional flexibility.  Wide selection AXIS F Series comprises one-channel AXIS F41 Main Unit, four-channel AXIS F34 and AXIS F44 Main Units, and AXIS F Sensor Units with different lens types, form factors and price points. The series also includes AXIS F34 Surveillance System, a complete hardware and software solution aimed at small stores and offices. With the exception of AXIS F34 Surveillance System, AXIS F main units and sensor units are sold separately to give customers the ability to put together the hardware features that best suit the application. Build your own camera system Click on the numbers at right to read more about the different components. Main unit The main unit houses the processor, network, power and other connections. It determines, among other things, the video streaming performance, the image settings available (such as wide dynamic range), and analytics. One-channel and four-channel main units are available. When there are up to four closely situated surveillance areas to be covered, the four-channel main units are cost-effective solutions as they can stream videos from four sensor units simultaneously.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
10
13

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.