View

Sorting

Products found: 7

logo
Offer a reference bonus
1.40

Arbor APS

• DDoS protection from active botnets • DDoS protection from active DDoS campaigns based on IP reputation • Advanced web crawler service • GeoIP tracking • Domain and IP reputation to block threats APS enhances your overall protection by using Cloud Signaling™ to connect local protection with cloud-based DDoS services. With Cloud Signaling, APS automatically alerts upstream service providers, such as your ISP or Arbor CloudSM, when larger attacks threaten availability. This allows for a faster time to mitigate attacks. 
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.70

BIG-IP Local Traffic Manager

BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability. Yes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning. Full proxy means full power. If you can see it, you can manipulate it. Because BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic. For example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it. Operational efficiency? Check. BIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers. Using real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience. Whether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications. The SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks. Often SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second. BIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

DefensePro

DefensePro provides world-class DDoS protection including distributed denial of service (DDoS) attack mitigation and SSL-based DDoS attacks to fully protect applications and networks against known and emerging network security threats such denial of service attacks, DDoS attacks, Internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks with: DDoS Protection With Dedicated Hardware That Protects Without Impacting Legitimate Traffic DefensePro uses a dedicated hardware platform based on Radware's OnDemand Switch supporting network throughputs up to 160Gbps. It embeds two unique and dedicated hardware components: a DoS Mitigation Engine (DME) to prevent high volume denial of service attacks and DDoS attacks, flood attacks, without impacting legitimate traffic, and a StringMatch Engine (SME) to accelerate signature detection. Centralized Attack DDoS Prevention Management, Monitoring and Reporting APSolute Vision is a DDoS prevention solution that offers a centralized attack management, monitoring and reporting solution across multiple DefensePro devices and locations. It provides the user real-time DDoS protection with identification, prioritization and response to policy breaches, cyber-attacks and insider threats. Complete Set of Security DDoS Attack Defense Mechanisms DDoS attack defense mechanisms include Intrusion Prevention System (IPS), Network Behavioral Analysis (NBA), anti-DDoS/Denial-of-Service (DoS) Protection, Reputation Engine and SSL Attack Protection. These DDoS attack defense mechanisms employ multiple detection & mitigation modules including adaptive behavioral analysis and challenge response technologies in addition to signature detection. The Accuracy of Inline, and the Scalability of Out of Path DefensePro DDoS protection and DDoS prevention devices can be deployed inline or out-of-path (OOP) in a scrubbing center to provide the highest mitigation accuracy within the shortest time. Read more about DefensePro's deployment models. Based on standard signature detection technology to prevent the known application vulnerabilities, DefensePro DDoS protection consists of patent protected behavioral based real-time signatures technology that detects and mitigates emerging network attacks in real time such as zero-minute attacks, DoS/DDoS attacks and application misuse attacks ― all without the need for human intervention and without blocking legitimate user traffic making it one of the top DDoS prevention solution.s DefensePro DDoS protection is a core part of Radware's next generation Attack Mitigation System (AMS) a set of patented technologies designed for the most advanced internet-borne cyber-attacks. AMS extends the "network" of attack detection and mitigation capabilities beyond the data center for: Cloud- hosted business services and applications Tools, servers and applications need protection within a virtualized environment Mobile work force increasingly depend on remote access to internal business applications and SaaS Advanced detection and mitigation techniques need to be ported to tomorrows open network fabrics
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.70

Imperva Incapsula

Incapsula can protect your organization against any DDoS threat. WEBSITE PROTECTION Always-on DDoS protection that automatically detects and mitigates attacks targeting websites and web applications. Website Protection is an optional DDoS mitigation service that can be added to any Website Security subscription. INFRASTRUCTURE PROTECTION On-demand or always-on protection against DDoS attacks that directly target your network infrastructure. Infrastructure Protection can be used to defend entire subnets. NAME SERVER PROTECTION Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults. Name Server Protection also accelerates DNS responses. ALL-INCLUSIVE DDOS PROTECTION Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets. 10-SECOND MITIGATION SLA When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds. HIGH-CAPACITY NETWORK Our high-capacity global network holds over  (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record. ATTACK VISIBILITY Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks. BLOCK ANY TYPE OF DDOS ATTACK Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:
  • TCP SYN+ACK
  • TCP FIN
  • TCP RESET
  • TCP ACK
  • TCP ACK+PSH
  • TCP Fragment
  • UDP
  • Slowloris
  • Spoofing
  • ICMP
  • IGMP
  • HTTP Flood
  • Brute Force
  • Connection Flood
  • DNS Flood
  • NXDomain
  • Mixed SYN + UDP or ICMP + UDP Flood
  • Ping of Death
  • Smurf
  • Reflected ICMP & UDP
  • As well as other attacks
... Learn more
ROI-calculator
ROI-
-
0
0
logo
Offer a reference bonus
2.40

PA-500 next-generation firewall

Key Security Features: Classifies all applications, on all ports, all the time • Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed. • Uses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping. • Categorizes unidentified applications for policy control, threat forensics or App-ID™ development. Enforces security policies for any user, at any location • Deploys consistent policies to local and remote users running on the Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms. • Enables agentless integration with Microsoft® Active Directory® and Terminal Services, LDAP, Novell® eDirectory™ and Citrix®. • Easily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information. Prevents known and unknown threats • Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed. • Limits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing. • Identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection. The controlling element of the PA-500 is PAN-OS®, a security-specific operating system that natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content, and user – in other words, the business elements that run your business –mare then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time. 
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

WiJungle U250X (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License

WiJungle seamlessly manages the network, internet and security of different business verticals like Enterprises, Education, Hospitality, Healthcare, Retail, Transport, Smart City, Defence, Residential Estates, Events etc. across the globe.
The product is available in 30+ different models to serve wide range of concurrent users with throughput range from 3.2 Gbps to 240 Gbps.

It offers features like

  • Access/Interface Management
  • Network Management
  • User/Guest Management
  • BandWidth Management
  • Quality Of Service
  • Data Leakage Prevention
  • Content Filtering
  • Load Balancing
  • High Availability
  • Gateway Anti-Virus
  • Anti-Spam
  • Web Server Protection
  • Sandbox
  • Advance Threat Protection
  • Intrusion Prevention System
  • Virtual Private Network
  • Vulnerability Assessment
  • Intuitive & Location Aware Captive Portals
  • SMS Gateway Integration
  • Social Media Engagement/Advertisement option
  • Feedback Management
  • User Logging
  • Reporting and Analytics
  • Prepaid/Postpaid Billing
  • Voucher Management
  • PMS/HIS Integration
  • AP/Device Management
  • Alert Management

 

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.00

WiJungle Unified Network Security Gateway (NextGen Firewall/UTM + Web Application Firewall + Hotspot Gateway + Load Balancer Router + VPN Router) With 3 Years License

WiJungle seamlessly manages the network, internet and security of different business verticals like Enterprises, Education Institutes, Hospitality, Healthcare, Retail, Transport, Smart City, Defence, Events etc.                
The product is available in 30+ different models to serve wide range of concurrent users.

It offers features like

  • Access/Interface Management
  • Network Management
  • User/Guest Management
  • BandWidth Management
  • Quality Of Service
  • Data Leakage Prevention
  • Content Filtering
  • Load Balancing
  • High Availability
  • Gateway Anti-Virus
  • Anti-Spam
  • Web Server Protection
  • Sandbox
  • Advance Threat Protection
  • Intrusion Prevention System
  • Virtual Private Network
  • Vulnerability Assessment
  • Intuitive & Location Aware Captive Portals
  • SMS Gateway Integration
  • Social Media Engagement/Advertisement option
  • Feedback Management
  • User Logging
  • Reporting and Analytics
  • Prepaid/Postpaid Billing
  • Voucher Management
  • PMS/HIS Integration
  • AP/Device Management
  • Alert Management
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.