View

Sorting

Products found: 7

logo
Offer a reference bonus
0.00

CryptoniteNXT

CryptoniteNXT is a network appliance that supplements existing network infrastructure to improve security. A unique combination of technologies effectively alters network behavior in real time with no human intervention. CryptoniteNXT blocks malicious activities while at the same time preserving performance and usability for legitimate purposes. Key Benefits of CryptoniteNXT
  • Eliminate cyber attacker reconnaissance which shuts down the attack at the earliest possible time, reducing the time to breach detection and reducing the risk of loss and damage to critical assets by a cyber attacker or an insider threat.
  • Minimizes or stops lateral movement by unauthorized parties similarly reducing the risk of loss and damage to critical assets.
  • Enables broad protection for devices with embedded processors (e.g. automated teller machines (ATMs), medical devices, security equipment, internet of things (IoT) devices and manufacturing industrial control systems) reducing the risk of loss and allowing the delay for investment in expensive equipment upgrades.
  • Reduce the risk of delays associated with the installation of critical security software patches and updates. Attackers cannot find, identify and leverage vulnerabilities if they cannot find or see the systems, map the network and research available exploits.
  • Enables a true “zero trust environment” which substantially reduces the probability of a successful cyber-attack from sophisticated outside attackers or malicious insiders.
  • Stops the propagation of specialized attacker tools such as ransomware.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
14
12
logo
Offer a reference bonus
0.00

ID Quantique Centauris CN9000 Series

The Centauris CN9000 Series is the first commercially available certified high-assurance 100Gbps Ethernet encryptor that supports the most complex fully meshed topologies – enabling 100% security for Big Data, Cloud and data centre services’ ultra-fast networks. Quantum Safe Security The Centauris CN9000 series are the ideal solution for organisations that are seeking for high security at full speed, at 100 Gbps. Providing high quality encryption key generation and distribution, the Centauris CN9000 series incorporate IDQ’s quantum random number generator (Quantis QRNG). By upgrading the Centauris CN9000 series with the unconditional security of Cerberis quantum key distribution (QKD) server, IDQ offers next generation security for pointto-point backbone and storage networks for long-term data protection. Performance The Centauris CN9000 series are ultra-high-performance encryptors, operating in full-duplex mode at 100 Gbps line rate speed. Using Field Programmable Gate Array (FPGA) technology, the Centauris CN9000 series’ architecture enables real-time data processing and high throughput. This ensures consistent low latency across all packet sizes for optical performance. Throughput is maximized in a zero protocol overhead mode. At 1U unit, they operate with minimal power and rack space consumption. Scalability Ethernet standards compliant, the Centauris CN9000 series are fully interoperable with industry standard network equipment from leading vendors. The ‘Bump in the Wire’ design provides a vendoragnostic and drop in the network approach to 100 Gbps encryption. The Centauris CN9000 series are easy to install and highly cost-effective. “Set and forget” simplicity, and application and protocol transparency are underlying design themes, ensuring easy implementation, operation and management, and minimal resource requirements. Devices can be field upgraded on site with ease, for maintenance, feature enhancements and security updates. Simplicity The Centauris CN9000 series are easily managed through a simple to use local and remote encryptor management application that provides users with comprehensive and intuitive management functionality. The encryptors can be securely managed either out-of-band — using a dedicated Ethernet management interface or in-band — using the encrypted Ethernet port. Local management using a command line interface is available via a serial console connector. Key Features
  • Robust, high-assurance encryption
  • State-of-the-art Swiss Quantum Safe security
  • Excellent TCO & ROI
  • Easy installation and management
Key Markets
  • Financial Services Companies
  • Healthcare Organisations
  • Cloud Service Providers
  • Governments
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
5
logo
Offer a reference bonus
2.00

McAfee Total Protection for Data Loss Prevention (DLP)

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives—on premises, in the cloud, or at the endpoints. Gain visibility Our capture technology allows you to see how your data is being used and how it is leaking out. Quickly identify data Stronger data classification identifies and classifies data that is important to your specific organization. Ensure you remain compliant Prioritize the remediation of critical compliance information and highly sensitive data over less critical data. Simplify deployment and management McAfee Total Protection for DLP is available through physical or virtual low-maintenance appliances, and uses McAfee ePolicy Orchestrator for streamlined deployment, management, updates, and reports. Easily synchronize on-prem and Cloud DLP policies By leveraging McAfee ePO, existing McAfee DLP customers can easily extend current enterprise DLP policies to the cloud. Connecting the two components can be as easy as one click and can be as fast as under a minute. Universal device-to-cloud data protection All McAfee DLP components leverage a common policy engine across endpoints, networks, and the cloud. There’s no need to recreate policies to protect the same piece of data in different environments, or to make the same change in more than one console. Centralized incident management and reporting McAfee offers users a single pane of glass experience when it comes to managing all DLP violations and reporting via McAfee ePO. There is no need to switch consoles to view incidents and generate reports regardless if the DLP violations are coming from corporate devices or cloud applications.
... Learn more
ROI-calculator
Configurator
ROI-
-
15
11
logo
Offer a reference bonus
1.40

Sophos UTM

Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection. Highlights
  • Every feature available  on every appliance
  • Firewall, VPN, ATP, IPS, email, web filtering and app control
  • Hardware, virtualized, software or cloudbased appliance
  • Intuitive browserbased interface
  • Built-in reporting on all models
  • Two-factor authentication with one-time password (OTP) in many areas
  • Integrated wireless controller
Consolidated network security platform — no compromise Protect your network using multi-layered proven protection technologies including Advanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the industry’s simplest admin interface. We’ve engineered our software and hardware to give you the throughput speeds you need. And, you can choose the level of protection you need with modular subscriptions as every feature is available on every appliance. All the Next-Gen Firewall features you need We’ll give you complete control to block, allow, shape and prioritize applications. Our Deep Layer-7 inspection (Next-Generation Firewall) ensures true application identification and has regular automatic updates. And you’ll get feedback on unclassified applications too. Intuitive management and detailed reporting You’ll know what’s happening with your users and you’ll have complete control over all the features you need, with none of the complexity. Easily build policies while getting detailed real-time and historical data with our on-box reporting, helping you to fix problems fast. And our Free Sophos UTM Manager lets you centrally administer several appliances through a single login. Connect remote offices with easy VPN and Wi-Fi Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It’s the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security. Sophos UTM also works as a wireless controller; access points are automatically set up and receive complete UTM protection.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
15
13
logo
Offer a reference bonus
2.70

TRITON AP-DATA

TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети

  • Предотвращение потери данных
  • Безопасность бизнес-процесса
  • Управление приложений и угроз

Data Discover - обнаружение конфиденциальной информации, хранимой в сети

  • Обнаружение мест хранения конфиденциальных данных
  • Измерение и уменьшение риска потери данных
  • Поддержка e-discovery для разрешаемого контроля

Data Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации

  • Мониторинг и блокировка утечки конфиденциальной информации
  • Ведение аудита
  • Измерение и уменьшение риска потери данных
  • Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов
  • Мониторинг и блокировка утечки конфиденциальной информации
  • Ведение аудита
  • Измерение и уменьшение риска потери данных
       

Data Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители

  • Мониторинг и блокировка утечки конфиденциальной информации
  • Ведение аудита
  • Измерение и уменьшение риска потери данных
... Learn more
ROI-calculator
Configurator
ROI-
-
1
9
logo
Offer a reference bonus
0.00

WiJungle U250X (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License

WiJungle seamlessly manages the network, internet and security of different business verticals like Enterprises, Education, Hospitality, Healthcare, Retail, Transport, Smart City, Defence, Residential Estates, Events etc. across the globe.
The product is available in 30+ different models to serve wide range of concurrent users with throughput range from 3.2 Gbps to 240 Gbps.

It offers features like

  • Access/Interface Management
  • Network Management
  • User/Guest Management
  • BandWidth Management
  • Quality Of Service
  • Data Leakage Prevention
  • Content Filtering
  • Load Balancing
  • High Availability
  • Gateway Anti-Virus
  • Anti-Spam
  • Web Server Protection
  • Sandbox
  • Advance Threat Protection
  • Intrusion Prevention System
  • Virtual Private Network
  • Vulnerability Assessment
  • Intuitive & Location Aware Captive Portals
  • SMS Gateway Integration
  • Social Media Engagement/Advertisement option
  • Feedback Management
  • User Logging
  • Reporting and Analytics
  • Prepaid/Postpaid Billing
  • Voucher Management
  • PMS/HIS Integration
  • AP/Device Management
  • Alert Management

 

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
1
logo
Offer a reference bonus
1.00

WiJungle Unified Network Security Gateway (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License

WiJungle seamlessly manages the network, internet and security of different business verticals like Enterprises, Education Institutes, Hospitality, Healthcare, Retail, Transport, Smart City, Defence, Events etc.                
The product is available in 30+ different models to serve wide range of concurrent users.

It offers features like

  • Access/Interface Management
  • Network Management
  • User/Guest Management
  • BandWidth Management
  • Quality Of Service
  • Data Leakage Prevention
  • Content Filtering
  • Load Balancing
  • High Availability
  • Gateway Anti-Virus
  • Anti-Spam
  • Web Server Protection
  • Sandbox
  • Advance Threat Protection
  • Intrusion Prevention System
  • Virtual Private Network
  • Vulnerability Assessment
  • Intuitive & Location Aware Captive Portals
  • SMS Gateway Integration
  • Social Media Engagement/Advertisement option
  • Feedback Management
  • User Logging
  • Reporting and Analytics
  • Prepaid/Postpaid Billing
  • Voucher Management
  • PMS/HIS Integration
  • AP/Device Management
  • Alert Management
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
9

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.