View

Sorting

Products found: 8

logo
Offer a reference bonus
2.40

Barracuda Email Security Gateway

Provides Inbound/Outbound Filtering and Data Leak Prevention
The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.
The Barracuda Email Security Gateway is offered without per-user or per-feature fees, and is also available as a virtual appliance or in a public cloud environment (Amazon Web Services (AWS), Microsoft Azure, or VMware vCloud Air). For hosted email security, see Barracuda Essentials for Email Security.
Protect Against Email-Borne Threats
With the Barracuda Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages.
Stop Threats before They Hit the Network
Offload CPU-intensive tasks like antivirus and DDoS filtering to the cloud reduces the processing load on the appliance and to ensure that threats never reach the network perimeter. The Barracuda Email Security Gateway is integrated with a cloud-based service that pre-filters email before delivery to the onsite Barracuda Email Security Gateway, which performs further inbound security checks and outbound filtering.
Ensure Continuous Email Availability
Email is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud Protection Layer, bundled free of charge with the Barracuda Email Security Gateway, email is spooled for up to 96 hours, with an option to re-direct traffic to a secondary server.
Protect Sensitive Data
Leverage powerful encryption technology to ensure that sensitive data cannot be viewed by outside parties. Outbound filtering and quarantine capabilities certify that every outbound email complies with corporate DLP policies.
Simple and easy to deploy configurations on the Barracuda Email Security Gateway guarantee that customized email protection is in place in a matter of minutes. Cloud-based centralized management enhances day-to-day workflow and is included with no additional fees.
The affordable, all-inclusive pricing model has no per-user fees, minimizing the investment in securing your email infrastructure.
... Learn more
ROI-calculator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Check Point 21000 Appliances

Delivers the best performance in its class
Up to 44.5 Gbps of real-world firewall throughput
Up to 6.9 Gbps of real-world IPS throughput
Supports sub 5 micro-second low-latency transactions
Supports high availability and serviceability
Offers a variety of network options to work in any network environment
Offers Lights-Out-Management option for remote out-of-band management
Enables service without downtime thanks to hot-swap and redundant components
Reduces costs through security consolidation
Extends easily to add more security features without adding a new appliance
Available in four complete and Software Blade packages that meet any security need
Available in a low-cost, high-performance package with extended memory for maximum connection capacity
Features
Maximum security and performance
The Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class.
High port density with up to 37x1GbE ports for network segmentation
110 Gbps firewall throughput and sub-5µs latency for mission-critical applications
Comes in compact 2-rack unit chassis
Comes with acceleration and clustering technologies
Reliability and high serviceability
Meet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks.
Hot-swappable redundant power supplies, hard disk drives and fans
An advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location
Prevent unknown threats
Check Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats.
Security acceleration module for greater performance confidence
With the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance.
Offloads security processing from the general purpose appliance CPU
Available as a bundle for significant savings right out of the box
High network capacity
Deploy the Check Point 21000 Appliances in any network environment.
Up to 37 10/100/1000Base-T ports
Up to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports
Three front-facing expansion slots
Up to 1,024 VLANs for higher network segmentation
Pre-configured with Next Generation Software Blade packages
Pre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages.
Next Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control)
Next Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent)
Next Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention).
Next Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security)
Next Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction.
Additional Software Blade upgrades are available to further extend and customize protection options
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Check Point 600 Appliance

 Benefits Secures your small business with advanced security Protects against viruses, spam, dangerous applications and malicious websites Designed from the ground up for the needs of small businesses Connects securely to your office network from any laptop, smartphone or tablet Sets up in minutes with easy and intuitive web-based management Simplifies your security management with optional Check Point SMB Managed Security Services Keeps you connected with flexibility, speed and power Supports multiple Internet access options, including Ethernet, ADSL, 3G and 4G Provides integrated wireless security with guest access Delivers market-leading speeds with 100 Mbps of real-world throughput Features Enterprise-caliber firewall and threat protection Small companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices. A comprehensive protection suite Leveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including: Firewall VPN Advanced Networking & Clustering Identity Awareness & User Awareness IPS Application Control URL Filtering Antivirus Anti-Bot Anti-Spam and Email Security Security managed via the cloud We can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page. Flexible network connections with high capacity The 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities. Integrated ADSL modem Included USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability Simple management, configuration and deployment The Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff. Simple web-based local management interface First-time set-up wizard Easy-to-understand logs and reports for hassle-free device monitoring
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Check Point vSEC Virtual Edition

Secure virtual environments Multi-layered security protections for virtual environments including next-generation firewall and advanced threat prevention Inspect all traffic—from inter-VM to perimeter—in the virtual network Permit secure access to remote systems and networks Unified management of virtual and physical environments Consistent security policy and uniform security management across both physical and virtual infrastructures Visibility into virtualization configuration and security changes Separation of duties between virtualization and security teams Licensing is based on virtual cores used and supports dynamic allocation ideal for elastic workloads Thanks to Check Point vSEC Virtual Edition (VE), we have a virtual security solution that fully integrates into our dynamic virtualized environment with all the performance, security and functionality we’ve expected from our physical Check Point gateways for years. Features Full protections with Check Point Software Blades Check Point vSEC Virtual Edition provides the full protections of the Check Point Software Blade architecture. Firewall, IPS, Antivirus, Anti-Bot Software Blades protect services in the public cloud from unauthorized access and attacks. Application Control Software Blade helps prevent application layer denial of service attacks and protects your cloud services. IPsec VPN Software Blade allows secure communication into cloud resources. Mobile Access Software Blade allows mobile users to connect to the cloud using an SSL encrypted connection with two factor authentication and device pairing. Data Loss Prevention Software Blade protects sensitive data from theft or unintentional loss. SandBlast Zero-Day Protection Blades provide the most comprehensive protection against malware and zero-day attacks. Consolidated logs and reporting for hybrid cloud environments Get visibility and enforcement across your virtual infrastructures using the Next Generation SmartEvent Software Blade. Simplify compliance and audits with unified logs and reporting. Centralized management for virtual and physical infrastructures Manage vSEC VE using your existing on-premise Check Point Unified Security Management Solution. Enforce a consistent security policy for corporate assets across both virtual and physical infrastructures from a single console.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.40

PA-500 next-generation firewall

Key Security Features: Classifies all applications, on all ports, all the time • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed. • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. • Categorizes unidentified applications for policy control, threat forensics or App-ID™ development. Enforces security policies for any user, at any location • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms. • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®. • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information. Prevents known and unknown threats • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing. • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection. The controlling element of the PA-500 is PAN-OS®, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content, and user – in other words, the business elements that run your business –mare then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time. 
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

PineApp Mail SeCure

Features
Security Perimeter PineApp ZDSTM.
Anti-Spam.
Antivirus.
Backscatter Prevention.
Load Balancing.
Anti-Spoofing.
Mail server (optional).
Four series of Mail-SeCure:
Mail-SeCure 1000: up to 50 mail users in your organization.
Mail-SeCure 2000 to 500 mail users.
Mail-SeCure 3000: up to 1500 mail users.
Mail-SeCure 5000: 10 000 email users.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

Sophos UTM

Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection. Highlights Ì Every feature available  on every appliance Ì Firewall, VPN, ATP, IPS, email, web filtering and app control Ì Hardware, virtualized, software or cloudbased appliance Ì Intuitive browserbased interface Ì Built-in reporting on all models Ì Two-factor authentication with one-time password (OTP) in many areas Ì Integrated wireless controller Consolidated network security platform—no compromise Protect your network using multi-layered proven protection technologies including Advanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the industry’s simplest admin interface. We’ve engineered our software and hardware to give you the throughput speeds you need. And, you can choose the level of protection you need with modular subscriptions as every feature is available on every appliance. All the Next-Gen Firewall features you need We’ll give you complete control to block, allow, shape and prioritize applications. Our Deep Layer-7 inspection (Next-Generation Firewall) ensures true application identification and has regular automatic updates. And you’ll get feedback on unclassified applications too. Intuitive management and detailed reporting You’ll know what’s happening with your users and you’ll have complete control over all the features you need, with none of the complexity. Easily build policies while getting detailed real-time and historical data with our on-box reporting, helping you to fix problems fast. And our Free Sophos UTM Manager lets you centrally administer several appliances through a single login. Connect remote offices with easy VPN and Wi-Fi Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It’s the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security. Sophos UTM also works as a wireless controller; access points are automatically set up and receive complete UTM protection.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

WiJungle U250X (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License

WiJungle seamlessly manages the network, internet and security of different business verticals like Enterprises, Education, Hospitality, Healthcare, Retail, Transport, Smart City, Defence, Residential Estates, Events etc. across the globe.
The product is available in 30+ different models to serve wide range of concurrent users with throughput range from 3.2 Gbps to 240 Gbps.

It offers features like

  • Access/Interface Management
  • Network Management
  • User/Guest Management
  • BandWidth Management
  • Quality Of Service
  • Data Leakage Prevention
  • Content Filtering
  • Load Balancing
  • High Availability
  • Gateway Anti-Virus
  • Anti-Spam
  • Web Server Protection
  • Sandbox
  • Advance Threat Protection
  • Intrusion Prevention System
  • Virtual Private Network
  • Vulnerability Assessment
  • Intuitive & Location Aware Captive Portals
  • SMS Gateway Integration
  • Social Media Engagement/Advertisement option
  • Feedback Management
  • User Logging
  • Reporting and Analytics
  • Prepaid/Postpaid Billing
  • Voucher Management
  • PMS/HIS Integration
  • AP/Device Management
  • Alert Management

 

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.