View

Sorting

Products found: 13

logo
Offer a reference bonus
2.00

Check Point 21000 Appliances

Delivers the best performance in its class Up to 44.5 Gbps of real-world firewall throughput Up to 6.9 Gbps of real-world IPS throughput Supports sub 5 micro-second low-latency transactions Supports high availability and serviceability Offers a variety of network options to work in any network environment Offers Lights-Out-Management option for remote out-of-band management Enables service without downtime thanks to hot-swap and redundant components Reduces costs through security consolidation Extends easily to add more security features without adding a new appliance Available in four complete and Software Blade packages that meet any security need Available in a low-cost, high-performance package with extended memory for maximum connection capacity Features Maximum security and performance The Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class. High port density with up to 37x1GbE ports for network segmentation 110 Gbps firewall throughput and sub-5µs latency for mission-critical applications Comes in compact 2-rack unit chassis Comes with acceleration and clustering technologies Reliability and high serviceability Meet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks. Hot-swappable redundant power supplies, hard disk drives and fans An advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location Prevent unknown threats Check Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats. Security acceleration module for greater performance confidence With the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance. Offloads security processing from the general purpose appliance CPU Available as a bundle for significant savings right out of the box High network capacity Deploy the Check Point 21000 Appliances in any network environment. Up to 37 10/100/1000Base-T ports Up to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports Three front-facing expansion slots Up to 1,024 VLANs for higher network segmentation Pre-configured with Next Generation Software Blade packages Pre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages. Next Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control) Next Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent) Next Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention). Next Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security) Next Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction. Additional Software Blade upgrades are available to further extend and customize protection options
... Learn more
ROI-calculator
Configurator
ROI-
-
7
3
logo
Offer a reference bonus
2.00

Check Point 600 Appliance

 Benefits Secures your small business with advanced security Protects against viruses, spam, dangerous applications and malicious websites Designed from the ground up for the needs of small businesses Connects securely to your office network from any laptop, smartphone or tablet Sets up in minutes with easy and intuitive web-based management Simplifies your security management with optional Check Point SMB Managed Security Services Keeps you connected with flexibility, speed and power Supports multiple Internet access options, including Ethernet, ADSL, 3G and 4G Provides integrated wireless security with guest access Delivers market-leading speeds with 100 Mbps of real-world throughput Features Enterprise-caliber firewall and threat protection Small companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices. A comprehensive protection suite Leveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including: Firewall VPN Advanced Networking & Clustering Identity Awareness & User Awareness IPS Application Control URL Filtering Antivirus Anti-Bot Anti-Spam and Email Security Security managed via the cloud We can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page. Flexible network connections with high capacity The 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities. Integrated ADSL modem Included USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability Simple management, configuration and deployment The Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff. Simple web-based local management interface First-time set-up wizard Easy-to-understand logs and reports for hassle-free device monitoring
... Learn more
ROI-calculator
Configurator
ROI-
-
4
15
logo
Offer a reference bonus
0.00

Esdenera Networks Firewall 3

The Esdenera Firewall 3 is a professional network appliance that has been built for enterprise networks, Infrastructure-as-a-Service (IaaS), and remote access solutions. It is build upon Esdenera's TNOS network operating system, a high-secure OpenBSD-based platform. In addition to the leading packet filter and stateful firewalling capabilities, Esdenera introduces applications identities, a programmable approach to detect apps, stacks and things that turns it into a truly next generation firewall. Features: Rules The enhanced PF packet filter provides a Stateful SPI-Firewall that filters, translates and normalizes network sessions of the IPv4 and IPv6 Internet protocols. And it can do much more – with built-in redundancy and failover options. Identities Use identities to filter on more than addresses and ports. They can describe people, things, applications, services, or entire software stacks using dynamic tables or accelerated, customizable programs. Relays Relays are stream-based and application-aware network engines. They can manage your web traffic, load balance connections, assign sophisticated user policies or inspect TLS connections as a trusted machine in the middle. Why use Esdenera® Firewall 3
  • Trusted Code
  •  

  • NFV Services
  •  

  • Cloud-ready
  •  

  • Built for SDN
  •  

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
2
8
logo
Offer a reference bonus
2.00

Fortinet FortiGate NGFW

FortiGate NGFWs are network firewalls powered by purpose-built security processing units (SPUs) including the latest NP7 (Network Processor 7). They enable security-driven networking, and are ideal network firewalls for hybrid and hyperscale data centers. Fortinet NGFWs reduce cost and complexity by eliminating points products and consolidating industry-leading security capabilities such as secure sockets layer (SSL) inspection including the latest TLS1.3, web filtering, intrusion prevention system (IPS) to provide fully visibility and protect any edge. Fortinet NGFWs uniquely meet the performance needs of hyperscale and hybrid IT architectures, enabling organizations to deliver optimal user experience, and manage security risks for better business continuity. FortiGate next-generation firewalls inspect traffic at hyperscale as it enters and leaves the network. These inspections happen at unparalleled speed, scale, and performance to ensure that only legitimate traffic is allowed, all without degrading user experience or creating costly downtime. As an integral part of the Fortinet Security Fabric, FortiGate NGFWs can communicate within the comprehensive Fortinet security portfolio as well as third-party security solutions in a multivendor environment. FortiGate NGFWs seamlessly integrate with artificial intelligence (AI)-driven FortiGuard and FortiSandbox services to protect against known and zero-day threats and improve operational efficiency through integration with Fabric Management Center.
... Learn more
ROI-calculator
Configurator
ROI-
-
19
12
logo
Offer a reference bonus
2.40

PA-500 next-generation firewall

The PA-500next-generation firewall is designed to protect medium sized networks. Rack-mountable. Supports fault-tolerant configurations.The PA-500 enables to secure organization through advanced visibility and control of applications, users and content at throughput speeds of up to 250 Mbps. Dedicated computing resources assigned to networking, security, signature matching and management functions ensure predictable performance. Key Security Features: Classifies all applications, on all ports, all the time • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed. • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. • Categorizes unidentified applications for policy control, threat forensics or App-ID™ development. Enforces security policies for any user, at any location • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms. • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®. • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information. Prevents known and unknown threats • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing. • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection. The controlling element of the PA-500 is PAN-OS®, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content, and user – in other words, the business elements that run your business –mare then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time. 
... Learn more
ROI-calculator
Configurator
ROI-
-
6
20
logo
Offer a reference bonus
0.00

Perimeter 81 Zero Trust Network Access

Fully Customizable, Zero Trust Networking

Perimeter 81’s Zero Trust Network Access it is a suite of  networking capabilities service designed to assure the security and integrity of organization’s network. Multi-Regional Deployment Deploy private gateways in different locations to ensure your network can best serve international branches and employees with reduced latency and optimal speed. Policy-Based Segmentation Easily segment network access with our group creation and G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP Identity Provider integration. Built-In Two Factor Verification Add an extra layer of security, prevent remote attacks and ensure regulatory compliance with SMS notifications, Google Authenticator and Duo Security authentication. Precise Split Tunneling Control whether you tunnel all your network traffic, or specific subnets, from our single-click client applications to Perimeter 81’s multi-tenant Network as a Service. Site-to-Site Interconnectivity Interconnect your cloud environments, including AWS, Azure, and Google Cloud, or create a secure communication link between two different networks located at different sites. Network Auditing & Monitoring Gain more insight into your network’s health, activity and security, including visibility into group and server creation, team member authentication, password changes and more. Defining Zero Trust for Your Network
  • Segment Your Network. Network segmentation allows organizations to define internal trust boundaries to granularly control traffic flow, enable secure network access and implement network monitoring.
  • Establish Trust Zones. Trust zones are comprised of distinct pockets of infrastructure where resources operate at the same trust level and similar functionality, minimizing pathways and limiting malicious threats.
  • Manage Your Infrastructure. Efficiently monitor the network via centralized management capabilities, allowing data to be processed by tools that may further enhance network visibility, detect unknown threats, or support compliance reporting.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

PureDome

PureDome is the cutting-edge corporate VPN that comes fortified with integrated cybersecurity, seamless remote team connectivity, and robust data access solutions. Empower your business with an impregnable fortress that safeguards your valuable assets and supercharges productivity – all within a centralized platform.

 

With PureDome's intuitive dashboard, you gain full control over your corporate network, efficiently managing teams and employees, creating customized groups, and controlling permissions – all through a unified point of administration.

 

Moreover you can experience a host of remarkable features, including the top-of-the-line Wireguard protocol, cloud-based gateways ensuring lightning-fast connections, and the ability to access your network securely from anywhere. Your data remains inviolable with the impenetrable AES 256-bit encryption and obfuscation techniques, preventing even the most determined cyber threats from gaining entry. Safety is paramount with PureDome's Internet Kill Switch, which instantly severs the connection if the VPN link is compromised, ensuring your sensitive information stays locked away from prying eyes. Take advantage of the split tunneling feature, allowing users to access both corporate and public networks simultaneously, elevating productivity to new heights.

 

Choose PureDome today and embrace a tailored VPN solution that fortifies your business against the evolving digital landscape. Stay ahead of the curve with unrivaled protection and watch your business thrive like never before!

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

Sophos UTM

Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection. Highlights
  • Every feature available  on every appliance
  • Firewall, VPN, ATP, IPS, email, web filtering and app control
  • Hardware, virtualized, software or cloudbased appliance
  • Intuitive browserbased interface
  • Built-in reporting on all models
  • Two-factor authentication with one-time password (OTP) in many areas
  • Integrated wireless controller
Consolidated network security platform — no compromise Protect your network using multi-layered proven protection technologies including Advanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the industry’s simplest admin interface. We’ve engineered our software and hardware to give you the throughput speeds you need. And, you can choose the level of protection you need with modular subscriptions as every feature is available on every appliance. All the Next-Gen Firewall features you need We’ll give you complete control to block, allow, shape and prioritize applications. Our Deep Layer-7 inspection (Next-Generation Firewall) ensures true application identification and has regular automatic updates. And you’ll get feedback on unclassified applications too. Intuitive management and detailed reporting You’ll know what’s happening with your users and you’ll have complete control over all the features you need, with none of the complexity. Easily build policies while getting detailed real-time and historical data with our on-box reporting, helping you to fix problems fast. And our Free Sophos UTM Manager lets you centrally administer several appliances through a single login. Connect remote offices with easy VPN and Wi-Fi Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It’s the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security. Sophos UTM also works as a wireless controller; access points are automatically set up and receive complete UTM protection.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
15
13
logo
Offer a reference bonus
0.00

SurfEasy VPN

SurfEasy VPN uses encryption to help block hackers from stealing the personal info you send and receive over Wi-Fi Features:
  • No-log network. We don’t retain any logs related to your online, browsing or downloading activity, so even we don’t know what you’re up to.
  • Bank-grade encryption. We use bank-grade encryption to ensure that your information has protection by the highest-quality technology.
  • One click IP masking. Switch your location with just one click.
  • 500 ultra fast servers in 28 countries (and increasing). With servers in 28 countries and counting, you can access your favorite apps and websites from abroad, just like at home.
  • Enhanced Tracker Blocker. Our tracker blocking algorithm blocks tracking cookies used by advertisers to follow you online, giving you a private and peaceful online experience.
  • Unlimited simultaneous use on 5 devices. Enjoy unlimited use on all your devices, even if you use them at the same time.
  • No data limits on all paid plans. All our paid plans give you no data limits, meaning you never have to worry about VPN usage limits.
  • Available on multiple platforms. SurfEasy VPN supports Windows, Mac, iOS, and Android. We also offer extensions for Opera and Chrome browsers.
  • Friendly phone/email/chat support. Our support team lives up to the friendly Canadian stereotype and are available 7 days a week (9am -5pm Est, English only) to help with whatever you need.
  • 99.9% uptime. Our reliable network maintains a 99.9% uptime.
  • 14-day money back guarantee for monthly plans. Not satisfied? Get your money back! We offer a hassle-free cancellation and refund policy.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

TheGreenBow VPN Client for Windows

Enterprises need to have remote access to the company's applications and servers quickly, easily and securely. TheGreenBow VPN Client enables employees to work from home or on the road, and IT managers to connect in remote desktop sharing to the enterprise infrastructure. The VPN Client offers a range of features from simple authentication via simple login to advanced full PKI integration capabilities. Main Features: Remote Desktop Sharing Multiple Remote Desktop Sharing sessions may be configured in the 'Remote Sharing' tab. This feature enables a user to share his machine on the corporate network from a remote location like home. When the user click on one of the Remote Desktop Sharing session, the associated VPN tunnel automatically opened, and an Remote Desktop Protocol session is launched to reached the remote machine. USB Mode TheGreenBow VPN Client brings the capability to secure VPN configurations and VPN security elements (e.g. PreShared key, Certificates, .) onto an USB Drive and out of the computer. This gives users the ability to attach a VPN Configuration:
  • to a specific computer: therefore the VPN tunnels defined in the VPN configuration can only be used on that specific computer.
  • to a specific USB drive: therefore the VPN tunnels defined in the VPN configuration can only be used with specific USB Drive.
Script configuration Scripts may be configured in the 'Scripts' tab. This tab can be found in Phase 2 Settings panel. Scripts or applications can be enabled for each step of a VPN tunnel opening and closing process:
  • Before tunnel is opened
  • Right after the tunnel is opened
  • Before tunnel closes
  • Right after tunnel is closed
This feature enables to execute scripts (batches, scripts, applications...) at each step of a tunnel connection for a variety of purposes e.g. to check current software release, to check database availability before launching backup application, to check a software is running, a logon is set... . It also enables to configure various network configuration before, during and after tunnel connections.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

TunnelBear VPN

Why millions of people are using TunnelBear Stop password and data theft Hackers can steal passwords and data over insecure public WiFi. TunnelBear blocks them to keep you secure. Protect your online privacy Network owners and internet providers can see everything you do online. With TunnelBear on, they can't see a thing. Access global content Some content is only available in certain regions. TunnelBear changes your virtual location so you can see it anywhere. Prevent IP-based tracking Ad services use your IP address to track your behaviour across sites. TunnelBear stops them by assigning you a new IP. Bypass local censorship Some governments block popular websites and apps. TunnelBear unblocks them by changing your virtual location. And way, way more Play on new game servers, prevent speed throttling, and unblock apps and websites on school and work networks.
Everything a VPN should have (and more) Engineered for speed Our global server network is optimized to let you surf and stream quickly. No throttling, no buffering, no fuss. Security you can rely on TunnelBear is the only VPN in the world to publish regular, independent security audits of our apps. Strong Encryption TunnelBear uses strong AES 256-bit encryption by default. Weaker encryption isn't even an option.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

UserGate Proxy & Firewall

Control Internet Access. Protect from Advanced Threats. UserGate Proxy & Firewall is an easy to use and affordable software alternative to numerous hardware gateway security appliances. It is used by more than 40,000 small and medium sized businesses and distributed enterprises across the globe. Network Firewall, IDPS, and Router Enforce uninterrupted connectivity, network access controls, and regulate Internet traffic. Keep viruses, worms, Trojans, and spyware from infesting your network. Guarantee the bandwidth levels required to serve business-critical applications. Monitoring User Internet Activity Control access to websites and enforce any reasonable corporate policy. Link the headquarters to remote users and branch offices through a Secure VPN connection Product Overview UserGate Proxy & Firewall is an all-in-one gateway security solution combining a network firewall, router, gateway antivirus, intrusion detection and prevention (IDPS), VPN server, web filtering, reporting and statistics and other important functions. It allows you to manage network traffic, optimize bandwidth, and provide Internet access control. How does it work? UserGate Proxy & Firewall can be installed on any Windows-based machine and works as a web security gateway. It provides Internet access sharing, web security, and traffic management. UserGate works basing on user account and applicable policies. The product lets administrators control traffic flow and trace web pages visited by employees. Numerous policies can be used to grant or restrict access to specific website categories, control downloads or application use, set traffic quotas, and keep detailed statistics.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
8
10
logo
Offer a reference bonus
0.00

ZenMate VPN

We believe security should be simple. ZenMate VPN gives you security, privacy, and peace of mind. Just one click will turn your device from vulnerable to protected and keep cybercriminals away! ZenMate VPN is available for:
  • Mac
  • Chrome
  • Apple TV
  • Win
  • Opera
  • Gaming
  • iOS
  • Open VPN
  • Chromebook
  • Android
  • Linux
  • Raspberry Pi
  • Firefox
  • Firestick TV
  • Smart TV
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
12
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.