View

Sorting

Products found: 12

logo
Offer a reference bonus
0.00

Cisco ONS 15454 Series

For over a decade, service providers and enterprises alike have relied on Cisco for metro, regional, long haul, and data center optical transport networks. These networks transport huge quantities of data at high rates over great distances, providing the foundation for all WANs. Get fourth-generation innovation
Cisco ROADM innovation continues into its fourth generation with the first Single Module ROADM. It combines multidegree wavelength switching functionality with optical amplification and spectrum analysis in a single slot line card.
Utilize new features
Along with advanced features, the 15454 provides wavelength switched optical network functionality. This embeds optical layer intelligence directly into network elements to support wavelength-on-demand services and dynamic restoration.
Gain flexible aggregation
Cisco optical transport aggregation solutions integrate packet, SONET, and OTN aggregation and switching into the DWDM transport platform. Customers will enjoy efficient wavelength fill and tight communication among network layers.
Streamline operations
Selected on a per card basis, a mix of Layer 1 services, time division multiplexing (TDM), and packet switching technologies can be deployed where needed. Meet customer and network requirements while simplifying operations.
Scale to 100 Gb and beyond
Cisco leads the optical transport industry as it moves toward coherent technology for DWDM transport of 100 Gb services. Powered by nLight Silicon, Cisco coherent technology will scale to even greater densities and higher bit rates.
... Learn more
ROI-calculator
Configurator
ROI-
-
10
7
logo
Offer a reference bonus
0.00

Cybereason Platform

 The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface.
Cybereason Offerings Deep Hunting Platform The Cybereason Deep Hunting Platform delivers endpoint detection and response (EDR), nextgeneration antivirus (NGAV), managed threat hunting, and threat intelligence — all in one solution and one single lightweight sensor.
Built using Cybereason's proprietary cybersecurity data analytics architecture, the platform focuses on collecting and analyzing behavioral data and correlating disparate data points to identify malicious operations and facilitate immediate action. The Cybereason Deep Hunting Platform doesn't simply secure your data; it leverages your data to secure.

Cybereason Complete Endpoint Protection Implement comprehensive endpoint protection with Cybereason’s Complete Endpoint Protection platform. The solution integrates the power of EDR and next-generation antivirus (NGAV) so you can replace your legacy AV with a single advanced endpoint solution.
  • Combination of centralized and endpoint-side analytics
  • Behavioral analysis in the Cybereason Hunting Engine
  • Full attack lifecycle protection
  • Single sensor and single Response Interface

Cybereason RansomFree Keep your personal files safe from ransomware with Cybereason RansomFree. Built on the same Cybereason detection methodology, RansomFree is protection software designed to detect and stop ransomware from encrypting your files. With a mission to help everyone – not just large enterprises, it provides RansomFree at no cost because protection should be accessible to everyone.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
13
7
logo
Offer a reference bonus
0.00

CyCognito platfrom

Manage Your Attack Surface

The CyCognito platform helps you identify all of the attacker-exposed assets in your IT ecosystem for a complete view of your attack surface. With its comprehensive global botnet, the CyCognito platform uniquely reveals unknown and unmanaged assets associated with your organization – including those in cloud, partner and subsidiary environments – that are critical to your cybersecurity risk management. In fact, CyCognito helps organizations identify 30 to 300% more assets than they knew existed prior to using the CyCognito platform.

Prioritize and Eliminate Attack Vectors

The CyCognito platform helps you eliminate critical attack vectors with a continuously updated and prioritized view of your attacker-exposed IT ecosystem. You and your security team can use the CyCognito platform to pinpoint critical risks just as attackers do. Organizations that still have to perform legacy external testing to meet customer agreements or compliance regulations use the CyCognito platform to augment and optimize those processes by focusing the legacy tests on the areas of greatest risk that the CyCognito platform has identified.

Monitor Subsidiary Risk

The CyCognito platform gives you immediate visibility of the security posture of your subsidiaries and organizations you are evaluating for merger or acquisition. It identifies their attack surfaces and the effectiveness of their security controls, without requiring any deployment or configuration.

Global Bot Network

CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed.

Asset Mapping

  • Web applications
  • Keyword and code fragments
  • Logos and icons
  • Deployed software
  • TLS configuration
  • IP ranges

Multi-Vector Attack Simulator

Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting.

SECURITY MODULES

Public Techniques:

  • Vulnerability assessment

  • Encryption analysis

Proprietary Techniques:

  • Authentication testing

  • Misconfiguration detection

  • Network design analysis

  • Data exposure detection

  • Code injection risks

Protecting Your Organization from Shadow Risk

Explore the different ways CyCognito helps take your cybersecurity risk out of the dark.
  • Completely External

Operates externally and continuously in the cloud, with no impact on business continuity.

  • Configuration Free

No need for software deployment, integration or configuration. It just works immediately, out of the box.

  • Runs Automatically

Works independently across your organization’s environment, without affecting operations.



... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
1
14
logo
Offer a reference bonus
0.00

Network Penetration Testing by Depth Security

Network Penetration Testing     

Simply understanding real-world information security threats and associated risks within the context of your organization has never been more difficult. Without an accurate understanding of exactly what your security posture looks like it's nearly impossible to know where to spend time and resources and in what order. We live in a world where the attackers are getting more sophisticated at a faster rate than the defenders are. The discovery of new vulnerabilities and ways to exploit them is an everyday occurrence. What was not vulnerable yesterday may be vulnerable today. Company’s network penetration testing services provide the quickest path to ground when you are trying to understand the real-world risk posed to your infrastructure, applications and users. They use the same techniques and tools that attackers do in order to actually show you what is possible rather than theorizing about it. Instead of guessing about impact and what "could" happen, they show you what can happen and provide play-by-play details of how and why exploitation occurred. They then provide prioritized tactical and strategic recommendations for how to address the issues discovered. Depth Security team provides this data in an easily consumable format for multiple audiences including executives, managers and technical staff.
  • External Discovery
It is difficult to defend yourself without knowing your complete attack surface. But more than ever, security leadership and staff are placed in that exact position. Perimeter Discovery service gives you a solid view of your external-facing systems and data. Experts go beyond simple DNS and IP enumeration to find what you don't know is out there.
  • External Network
Performed from the perspective of an internet-based attacker. Team simulates real-world attacks on your organization by focusing on internet-exposed assets and users.
  • Internal Network
Executed from the inside of your organization's network. These engagements simulate an attack by an agent with internal access to your network such as a rogue employee or contractor.
  • Wireless
Performed from the perspective of an attacker who is within wireless range. They evaluate the wireless network's security posture in the context of generally accepted network security "best practices."
  • Trusted Access
Performed from the perspective of an authorized entity with some level of access to your environment. Common scenarios include testing with the same level of access as partners and vendors connected to your organization's network through remote access technologies such as VPN, SSLVPN, Citrix, etc.
  • Continuous
 Penetration testing is most commonly performed annually, semi-annually or quarterly. These engagements offer a "point-in-time" perspective on the security of an organization.  Continuous penetration testing begins with an initial annual penetration test as a starting point,followed by continuous, ongoing testing throughout the year.
  •  IoT (Internet of Things)
Depth Security’s team has identified and responsibly disclosed many vulnerabilities within popular IoT devices. Let them discover and exploit software and hardware flaws within your devices and services before someone else does.

Why Choose Depth Security?

  • Remediation Verification (Re-test) Included
  • Post-Assessment Debriefing Presentation Included
  • Prioritized, Short and Long-Term Recommendations
  • Executive, Management and Technical Reports
  • Real-World Attack Scenarios
  • Step-by-Step Exploitation
  • Mature, Experience-Driven Methodology
  • Thousands of Assessments Performed
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
18
12
logo
Offer a reference bonus
0.00

Niagara Visibility Controller

Niagara Visibility Controller (NVC) is an Enterprise-wide unified manager for network visibility. Whether you are an administrator looking for an overview of all of your visibility nodes (network packet brokers, network taps, network bypasses) for your virtual data center, or an engineer studying the configuration details, the key to addressing the evolving and dynamic needs of the network visibility layer is best described as being seamless. Features
  • Centralized management, monitoring and configuration of multiple visibility nodes.
  • Reducing configuration time and errors.SDN architecture - OpenFlow discovery and topology visualization.
  • User-friendly and intuitive Fabric Flow creation.
  • Easy-to-complete firmware updates and configurations updates of multiple visibility nodes from a single pane-of-glass UI.
  • REST API Support for programmability.
  • Unified management for network packet brokers, network bypasses, and network taps.
  • Ability to see the ‘forest’ and the ‘trees’.
  • Seamlessly navigate between three panes of management, from Group view to detailed Device view.
  • Available in a self-install Virtual Machine package.User Management, User Roles, and Authentication.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
1
logo
Offer a reference bonus
0.00

Skybox Change Manager (CM)

Enterprises have to deal with a constant stream of firewall change requests. Despire the pressure that may be felt by the volume of those requests, or any implementation errors, it’s important that availability, security and compliance are not compromised. Skybox® Change Manager fully automates firewall change management workflows, including rule creation, recertification and deprovisioning. And its analytics–driven automation ensures each change is properly handled from request to implementation and verification. Change Manager delivers automated modeling capabilities to assess potential business impacts, and closed-loop rule life cycle management to verify that every change is executed as intended. With customized, automated workflows, IT security teams can improve change management efficiency by up to 80 percent.* With Skybox Change Manager, you can:
  • Fully automate firewall change management workflows, improving communication and efficiency across security teams
  • Validate proposed firewall changes by checking for access and rule policy violations, as well as new vulnerabilities
  • Use formalized tickets and closed-loop workflows to ensure changes match the original intent
  • Customize and simplify processes to reduce change management time by 80 percent*
  • Establish end-to-end rule life cycle management for secure infrastructure and optimized firewalls
Change Manager Benefits Fully Automates Firewall Change Workflows
  • Reduces the chance of human errors and rollbacks of incorrect changes
  • Enables customizable change workflow based on type of request
  • Ensures accurate change planning and implementation within the context of the network
  • Provides option for automated provisioning for select firewall changes
Simplifies and Formalizes Rule Recertification
  • Automates rule recertification workflow
  • Calculates change risk to inform decisions on when next to review rule
  • Streamlines review process by maintaining information on stakeholders
Assesses Risk and Compliance Issues of Proposed Changes
  • Identifies potential compliance issues and vulnerability exposures to new portions of the network a proposed change could introduce
  • Models change impact on network security and compliance before implementation
Ensures Change Compliance
  • Establishes a fully automated approval process from change request through implementation and verification
  • Delivers a complete and verifiable audit trail and change reconciliation report
  • Provides closed-loop change management capabilities to ensure all changes are implemented as intended
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
11
18
logo
Offer a reference bonus
1.00

Skybox Horizon

Skybox® Horizon gives security leaders a simple picture of their organization’s entire attack surface. But behind this picture is a heavily detailed, interactive model giving you fast insight to your biggest cyber risks. With this insight and systematic prioritization, you can quickly eliminate imminent threats, while continuously monitoring potential threats.
Horizon isn’t just a topology map. It’s the product of intelligence from the entire Skybox® Security Suite in a single pane of glass. Horizon provides an abstracted view of the deeper Skybox model that includes hybrid network topology — across on–prem, multi–cloud and operational technology (OT) environments — security controls, assets, vulnerabilities and threats.  BENEFITS OF SKYBOX HORIZON Unifies Data in a Simple Picture
  • Consolidates data silos from endpoint and network security products, including physical IT, multi–cloud and OT networks
  • Incorporates data provided by vendors and Skybox® Research Lab intelligence of exploits in the wild and available exploit code
  • Creates a map of servers, endpoints, security and networking devices and hybrid network topology and gives insights to security exposures
Pinpoints Indicators of Exposure
  • Quickly shows exposed vulnerabilities and vulnerability exploit status based on intelligence from the current threat landscape
  • Prioritizes IOEs to reflect the risk and likelihood of an attack
  • Filters IOEs by types and severity level for dynamic analysis
Minimizes Response Times to Contain Attacks Quickly
  • Identifies vulnerabilities that pose the most risk across the entire enterprise, based on your attack surface and the threat landscape
  • Distinguishes between real exposures and security issues that are effectively mitigated by compensating controls
  • Enables security leaders to direct resources to patching or remediating systems and applications most at risk
Delivers Security Status Information Useful to All Stakeholders
  • Develops a common understanding of risks and remediation priorities across technical and business groups
  • Justifies security investments to CEO and CFO
  • Tracks and reports on progress toward strategic security or compliance goals with IOE trends or historical comparisons
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
5
20
logo
Offer a reference bonus
0.00

Skybox Network Assurance (NA)

Skybox® Network Assurance provides seamless visibility across physical IT, multi–cloud and operational technology (OT) environments, giving you the context needed to understand how network devices and security controls work together or leave you exposed. It continually ensures that the existing access in your infrastructure doesn’t exceed the desired access designed in your policies, and uncovers potential attack vectors, including those that could be used in lateral movement. Designed to support large and complex enterprise networks, Network Assurance empowers you to:
  • Visualize and interact with a model of your entire network topology, assets and security controls
  • Keep security zones and device configurations in continuous compliance and working to reduce your attack surface
  • Troubleshoot network connectivity and identify root causes of network outages to ensure business continuity and continuous uptime
When managing a complex network environment — whether on–prem or in the cloud — you need to understand what the human eye can’t see. Network Assurance creates a model of your network so you can easily visualize complex security zones, network paths, compliance violations and configuration issues. And Network Assurance helps you focus on high–impact issues requiring immediate action to ensure continuous availability, security and compliance. BENEFITS Delivers Continuous Detection of Security Threats and Compliance Risks
  • Collects data from 130+ network and security devices (see the full list on our website)
  • Displays detailed, normalized configurations of firewalls and routers, as well as virtual assets
  • Creates a network topology map that unifies traditional IT, public and private clouds and OT networks that can be exported to Microsoft Visio
Speeds Network Troubleshooting to Keep Business Services Running 24/7
  • Minimizes downtime by reducing network configuration errors
  • Troubleshoots network device configurations and previews changes before implementation
  • Identifies root causes of outages quickly and accurately
  • Improves visibility and workflow for network security teams
Uncovers Access Issues and Attack Vectors
  • Correlates all ACLs (including those for cloud assets), security tags, routing rules, NAT, proxies, VPNs and more to find blocked or allowed access
  • Incorporates asset vulnerability data for physical or virtual machines in network path analysis
  • Analyzes network paths in public and private cloud environments for both north–south and east–west traffic
Maintains Continuous Compliance
  • Performs continuous compliance analysis for configurations and security zone policies
  • Normalizes security tags and other access rules throughout hybrid networks
  • Enables security policy customization
... Learn more
-
ROI-calculator
Configurator
ROI-
-
13
12
logo
Offer a reference bonus
0.00

Skybox Security Suite

The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks. By integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility across physical IT, multi–cloud and OT networks. Our analytics and intelligence provide the context needed to bridge the gaps between point solutions, so security teams can fulfill the goals of vulnerability, threat, firewall and security policy management programs — even in the world’s largest organizations. TOTAL VISIBILITY See everything in your hybrid network in one view Skybox analyzes information from your organization’s assets and networks to provide a contextual understanding of your risk of cyberattack so you can proactively address that risk. Collecting data from a variety of sources, Skybox builds a model encompassing your:
  • Network topology (routers, load balancers, switches)
  • Security controls (firewalls, IPS, VPN)
  • Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)
  • Vulnerabilities and threats
The model is regularly and automatically updated to reflect the actual state of your network. THREAT–CENTRIC VULNERABILITY MANAGEMENT Stop chasing the wrong vulnerabilities Skybox takes a fundamentally different approach to vulnerability management. Using asset, network and threat context, we focus remediation on vulnerabilities most likely to be attacked: those with active exploits in the wild and exposed in your environment. Skybox analyzes multiple factors to prioritize remediation, including:
  • Vulnerability severity
  • Compliance
  • Age
  • Location
  • Exploitability
  • Prevalence (density)
  • Asset role
  • Asset value
  • Threats
  • Network topology
  • Security controls
SECURITY POLICY MANAGEMENT Automate and orchestrate across your entire network Skybox delivers automated tasks and workflows to simplify and centralize security policy management across traditional IT, multi–cloud and OT networks.
  • Create analytics–driven, automated processes that scale and adapt to a growing network
  • Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors
  • Streamline the creation of new firewall rules and efficiently manage rule recertification
  • Perform same–day audits and simplify reporting
The Suite includes 5 modules and Research Lab’s intelligence feed on a common platform. Modules can be licensed individually or together:
  • Skybox® Vulnerability Control
  • Skybox® Change Manager
  • Skybox® Firewall Assurance
  • Skybox® Network Assurance
  • Skybox® Horizon
  • Skybox® Research Lab
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
7
10
logo
Offer a reference bonus
0.00

Tripwire Enterprise

Tripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management. Organizations can use these solutions together for a complete end-to-end SCM solution, or use its file integrity monitoring or policy management solutions on their own to address today’s pressing security and compliance challenges, while building a foundation that positions them to address tomorrow’s. The suite lets IT security, compliance, and IT operations teams rapidly achieve a foundational level of security throughout their IT infrastructure by reducing the attack surface, increasing system integrity and delivering continuous compliance. Plus, because Tripwire Enterprise integrates with enterprise applications to automate workflow with additional security point solutions like SIEMs and change management tools, organizations can broaden their security worldview and gain even greater efficiencies. A key IT enterprise security and compliance solution, Tripwire Enterprise supports a detect, respond and prevent strategy by:
  • Detection of cyber threats and possible breach activity by highlighting possible indicators of compromise.
  • Response to deviations with high value, low volume alerts with guidance on what to do to return the system to a known secure state.
  • Prevention through adapting and prioritizing threats and change deviations to maintain a consistently hardened and objective view of overall security posture across all devices and systems.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
16
1
logo
Offer a reference bonus
0.00

vSTAX Secure

A comprehensive suite of best-of-breed security solutions enabling total peace of mind.

vSTAX Secure is an extensive suite of Best of Breed Security Solutions, designed to safeguard your business and give you total piece of mind. As a Managed Security Service, vSTAX Secure combines Firewalls, Anti-Virus, Anti-Malware, EFSS, Content Filtering, Web Filtering and Encryption to keep your business safe from security breaches, legal liabilities and costly virus clean ups.

Complete IT Security with vSTAX® Secure

Companies of all sizes - from the smallest start-up to the largest of enterprises - are constantly at risk of virus infection, malicious attack or data loss through inadequate technology. Each day, thousands of organisations around the world unknowingly have their IT security compromised. Threats and vulnerabilities are also constantly changing meaning that it is vital for organisations to be prepared by having a strong IT Security solution in place. Working with our industry-leading partners, vSTAX® Secure can be customised to match your business requirements, keeping your organisation safe from security breaches, legal liability and costly virus clean-ups.

Features

  • Full security audit available before implementation
  • Fully secures organisations against the threat of virus infection and malicious attack
  • Best of breed approach maximises security architecture
  • Industry leading partner vendors including F Secure, Kaspersky and Sophos

Ransomware Protection with vSTAX® Secure

Ransomware is the Number 1 malware attack affecting organisations today. The consequences of an attack can be severely damaging to any business, as productivity drops, data can be lost and reputation is compromised. Visit our Ransomware page to see how vSTAX® Secure can be combined with vSTAX® Protect and vSTAX® Recover to protect against Ransomware.

Web Vulnerability Scanning with vSTAX® Secure

Web Application security is becoming an integral part of organisational security strategy. Over 85% of hacks in 2016 were external, with thousands of new hacking techniques emerging on a weekly basis. Regular vulnerability scanning therefore ensures that companies stay on top of any past, present and future cyber threat, resulting in a proactive rather than reactive approach to security. With vSTAX® Secure, clients can run thorough assessments of their web applications and network perimeter in order to check for vulnerabilities. Once the assessment is complete, we offer easy to follow remediation in order to reduce the risk of outside attack.

DDoS Protection with vSTAX® Secure

A Distributed Denial of Service (DDOS) attack is an attempt to make an online service - such as a website, database, banking facility or online store – unavailable by overwhelming it with traffic. The result of this type of attack is severe disruption of service which can result in huge loss of revenue, a decline in customer trust and damage to your reputation. What is even more concerning is that you may not even know an attack has taken place until your services have been severely compromised – at which point damage has already been done.  vSTAX Secure® provides complete DDOS protection, powered by Kaspersky Labs. Highly sophisticated methods are used to monitor your traffic and build up a profile of “normal traffic”.


... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
11
logo
Offer a reference bonus
0.00

Zeguro Cyber Safety

Monitoring

  • Set up automated scans in minutes.

Simply enter your web app’s URL, choose your scan level and frequency, and schedule your scan to run.
  • Reduce web-based risks.

Find and patch security issues in your web apps on a routine basis to reduce the risk of a web-based attack.
  • Stay in compliance.

Monitoring module helps you fulfill security requirements in compliance frameworks such as PCI DSS, HIPAA, and SOC 2.

50% of SMBs have experienced a web-based attack.

According to Ponemon Institute’s most recent Global State of Cybersecurity in SMBs, web-based attacks are the second most common cyberattack experienced by SMBs. Hackers take advantage of web vulnerabilities, outdated software, and configuration errors to infiltrate your web applications and gain access to sensitive data. Securing your web applications, which includes your public-facing website as well as any web applications your customers might log into, is imperative to keeping your business and your customers’ data safe.

Protect your web applications from hackers 

Web app vulnerability scanners look for weaknesses in your web apps so they can be fixed before they’re exploited by hackers. Zeguro’s Monitoring module makes web app scanning quick, easy, and customizable. Choose between lightning and normal scan levels and a monthly or quarterly cadence. You can even schedule your scan for a specific day and time. Once scans are completed, you’ll get clear, actionable results. The downloadable report prioritizes vulnerabilities based on criticality, and includes evidence showing where each vulnerability exists along with a set of suggested fixes.

Protect your business through people, process, and technology. With Zeguro Cyber Safety, you will also get access to:

  • Training

Improve employee cybersecurity awareness. Zeguro’s Training module provides a cybersecurity skills assessment for all enrolled employees at your company, and targeted training based on each employee’s strengths and weaknesses.
  • Security Policies

Get security policy templates that cover important areas required in many compliance frameworks like PCI DSS and HIPAA. Need policies outside of template package? Upload custom policies so you can conveniently manage all your policies and download to share with auditors, business partners, and employees.
  • Insurance

Cyber insurance provides an additional safety net in the event of a breach. Cyber Safety platform users enjoy discounted rates on our insurance, which is tailored to your business’ unique risk profile.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
8

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.