View
Sorting
Products found: 7
CryptoniteNXT
- Eliminate cyber attacker reconnaissance which shuts down the attack at the earliest possible time, reducing the time to breach detection and reducing the risk of loss and damage to critical assets by a cyber attacker or an insider threat.
- Minimizes or stops lateral movement by unauthorized parties similarly reducing the risk of loss and damage to critical assets.
- Enables broad protection for devices with embedded processors (e.g. automated teller machines (ATMs), medical devices, security equipment, internet of things (IoT) devices and manufacturing industrial control systems) reducing the risk of loss and allowing the delay for investment in expensive equipment upgrades.
- Reduce the risk of delays associated with the installation of critical security software patches and updates. Attackers cannot find, identify and leverage vulnerabilities if they cannot find or see the systems, map the network and research available exploits.
- Enables a true “zero trust environment” which substantially reduces the probability of a successful cyber-attack from sophisticated outside attackers or malicious insiders.
- Stops the propagation of specialized attacker tools such as ransomware.
ID Quantique Centauris CN9000 Series
- Robust, high-assurance encryption
- State-of-the-art Swiss Quantum Safe security
- Excellent TCO & ROI
- Easy installation and management
- Financial Services Companies
- Healthcare Organisations
- Cloud Service Providers
- Governments
McAfee Total Protection for Data Loss Prevention (DLP)
Sophos UTM
- Every feature available on every appliance
- Firewall, VPN, ATP, IPS, email, web filtering and app control
- Hardware, virtualized, software or cloudbased appliance
- Intuitive browserbased interface
- Built-in reporting on all models
- Two-factor authentication with one-time password (OTP) in many areas
- Integrated wireless controller
TRITON AP-DATA
TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети
- Предотвращение потери данных
- Безопасность бизнес-процесса
- Управление приложений и угроз
Data Discover - обнаружение конфиденциальной информации, хранимой в сети
- Обнаружение мест хранения конфиденциальных данных
- Измерение и уменьшение риска потери данных
- Поддержка e-discovery для разрешаемого контроля
Data Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации
- Мониторинг и блокировка утечки конфиденциальной информации
- Ведение аудита
- Измерение и уменьшение риска потери данных
- Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов
- Мониторинг и блокировка утечки конфиденциальной информации
- Ведение аудита
- Измерение и уменьшение риска потери данных
Data Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители
- Мониторинг и блокировка утечки конфиденциальной информации
- Ведение аудита
- Измерение и уменьшение риска потери данных
WiJungle U250X (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License
It offers features like
- Access/Interface Management
- Network Management
- User/Guest Management
- BandWidth Management
- Quality Of Service
- Data Leakage Prevention
- Content Filtering
- Load Balancing
- High Availability
- Gateway Anti-Virus
- Anti-Spam
- Web Server Protection
- Sandbox
- Advance Threat Protection
- Intrusion Prevention System
- Virtual Private Network
- Vulnerability Assessment
- Intuitive & Location Aware Captive Portals
- SMS Gateway Integration
- Social Media Engagement/Advertisement option
- Feedback Management
- User Logging
- Reporting and Analytics
- Prepaid/Postpaid Billing
- Voucher Management
- PMS/HIS Integration
- AP/Device Management
- Alert Management
WiJungle Unified Network Security Gateway (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License
WiJungle seamlessly manages the network, internet and security of different business verticals like Enterprises, Education Institutes, Hospitality, Healthcare, Retail, Transport, Smart City, Defence, Events etc.
The product is available in 30+ different models to serve wide range of concurrent users.
It offers features like
- Access/Interface Management
- Network Management
- User/Guest Management
- BandWidth Management
- Quality Of Service
- Data Leakage Prevention
- Content Filtering
- Load Balancing
- High Availability
- Gateway Anti-Virus
- Anti-Spam
- Web Server Protection
- Sandbox
- Advance Threat Protection
- Intrusion Prevention System
- Virtual Private Network
- Vulnerability Assessment
- Intuitive & Location Aware Captive Portals
- SMS Gateway Integration
- Social Media Engagement/Advertisement option
- Feedback Management
- User Logging
- Reporting and Analytics
- Prepaid/Postpaid Billing
- Voucher Management
- PMS/HIS Integration
- AP/Device Management
- Alert Management
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.