View

Sorting

Products found: 63

logo
Offer a reference bonus
0.00

Check Point 1200R

Industrial Control Systems (ICS) used in critical infrastructure and manufacturing industries are targets of sophisticated cyberattacks. The Check Point 1200R rugged appliance line delivers proven, integrated security for deployment in harsh environments as part of a complete end-to-end ICS security solution.

Features

Wide range of appliances for IT and OT networks The 1200R Rugged Appliance complements our extensive appliance family to support a diverse range of deployment environments and meet specialized requirements in ICS security. The 1200R complies with industrial specifications such as IEEE 1613 and IEC 61850-3 for heat, vibration and immunity to electromagnetic interference (EMI). In addition, the 1200R is certified for maritime operation per IEC-60945 and IACS E10 and complies with DNV 2.4. The 1200R Appliances can also be used in commercial deployments. Inspect Encrypted Connections There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data. Next-Generation Firewall Check Point Application Control has broad support for specialized Industrial Control System and SCADA protocols with granularity for over 800 SCADA specific commands. This enables protocol-specific visibility and controls with directional awareness. Integrated threat detection and prevention Detect and prevent targeted attacks against ICS/SCADA components in Operational Technology (OT) environments with specific protections for these highly vulnerable, unpatched, legacy embedded systems. Our threat prevention technologies have the best catch rate in the industry and can be deployed in detect-mode to minimize the disruption of operational processes. Best-in-class management Administrators can define security policy for the entire network — including internal security, main sites, and remote sites — from a single, centrally located Check Point Security Management server. With SmartProvisioning™, a profile-based management approach designed for large- scale deployments, administrators can define a single security and device profile and apply it simultaneously to thousands of appliances — dramatically reducing deployment time and administrative overhead.

Benefits

  • Deploy SCADA networking security in harsh environments and remote locations
  • Full visibility and granular control of SCADA traffic
  • Comprehensive security with SCADA-aware threat detection and prevention
... Learn more
ROI-calculator
Configurator
ROI-
-
5
14
logo
Offer a reference bonus
2.00

Check Point 21000 Appliances

Delivers the best performance in its class Up to 44.5 Gbps of real-world firewall throughput Up to 6.9 Gbps of real-world IPS throughput Supports sub 5 micro-second low-latency transactions Supports high availability and serviceability Offers a variety of network options to work in any network environment Offers Lights-Out-Management option for remote out-of-band management Enables service without downtime thanks to hot-swap and redundant components Reduces costs through security consolidation Extends easily to add more security features without adding a new appliance Available in four complete and Software Blade packages that meet any security need Available in a low-cost, high-performance package with extended memory for maximum connection capacity Features Maximum security and performance The Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class. High port density with up to 37x1GbE ports for network segmentation 110 Gbps firewall throughput and sub-5µs latency for mission-critical applications Comes in compact 2-rack unit chassis Comes with acceleration and clustering technologies Reliability and high serviceability Meet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks. Hot-swappable redundant power supplies, hard disk drives and fans An advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location Prevent unknown threats Check Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats. Security acceleration module for greater performance confidence With the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance. Offloads security processing from the general purpose appliance CPU Available as a bundle for significant savings right out of the box High network capacity Deploy the Check Point 21000 Appliances in any network environment. Up to 37 10/100/1000Base-T ports Up to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports Three front-facing expansion slots Up to 1,024 VLANs for higher network segmentation Pre-configured with Next Generation Software Blade packages Pre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages. Next Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control) Next Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent) Next Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention). Next Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security) Next Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction. Additional Software Blade upgrades are available to further extend and customize protection options
... Learn more
ROI-calculator
Configurator
ROI-
-
7
3
logo
Offer a reference bonus
2.00

Check Point 600 Appliance

 Benefits Secures your small business with advanced security Protects against viruses, spam, dangerous applications and malicious websites Designed from the ground up for the needs of small businesses Connects securely to your office network from any laptop, smartphone or tablet Sets up in minutes with easy and intuitive web-based management Simplifies your security management with optional Check Point SMB Managed Security Services Keeps you connected with flexibility, speed and power Supports multiple Internet access options, including Ethernet, ADSL, 3G and 4G Provides integrated wireless security with guest access Delivers market-leading speeds with 100 Mbps of real-world throughput Features Enterprise-caliber firewall and threat protection Small companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices. A comprehensive protection suite Leveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including: Firewall VPN Advanced Networking & Clustering Identity Awareness & User Awareness IPS Application Control URL Filtering Antivirus Anti-Bot Anti-Spam and Email Security Security managed via the cloud We can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page. Flexible network connections with high capacity The 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities. Integrated ADSL modem Included USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability Simple management, configuration and deployment The Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff. Simple web-based local management interface First-time set-up wizard Easy-to-understand logs and reports for hassle-free device monitoring
... Learn more
ROI-calculator
Configurator
ROI-
-
4
15
logo
Offer a reference bonus
2.40

Check Point Intrusion Prevention System Software Blade

The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention – all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Benefits
  • Next-generation security prevention, protection and performance
  • Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
  • Check Point is ranked #1 in Microsoft and Adobe threat coverage
  • Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
  • Unrivaled, multi-Gigabit performance in an integrated IPS
  • Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
  • Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
  • CoreXL technology provides the most efficient and high-performance use of multi-core technologies
  • Lowest TCO and fastest ROI of any enterprise-class firewall solution
  • One-click activation of IPS and firewall protection on any Check Point gateway
  • Delivers unmatched extensibility and flexibility—all without adding CapEx
  • Integrated into Check Point Software Blade Architecture for on-demand security
The Check Point IPS Software Blade is delivering better security than our previous IPS software solution and at a lower cost. Check Point has designed the IPS software blade for efficient resource utilization, which improves performance, mission critical availability, and uptime. Complete Intrusion Prevention System (IPS) Functionality The Intrusion Protection System Software Blade complements firewall protection, further securing your network without degrading gateway performance. Full-featured IPS The IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:
  • Malware attacks
  • Dos and DDoS attacks
  • Application and server vulnerabilities
  • Insider threats
  • Unwanted application traffic, including IM and P2P
  • Geo-protections
Geo-protections enforce or monitor traffic based on the source or destination country. Create a geo-protection policy with exceptions to allow legitimate traffic through while blocking or monitoring traffic from unknown and untrusted sources. Monitor activity with the SmartEvent Software Blade. Trusted Security Real-Time protections – The IPS Software Blade is constantly updated with new defenses against emerging threats. Many of the IPS protections are pre-emptive, providing defenses before vulnerabilities are discovered or exploits are even created. Microsoft vulnerability coverage – Check Point is ranked #1 in Microsoft threat coverage, including preemptive protections against emerging vulnerabilities and exploits. Multi-gigabit Integrated IPS Performance Delivers up to 15 Gbps of IPS throughput with the default IPS profile. The IPS Software Blade incorporates a high-speed pattern matching engine that does multi-layered, 2-tier inspection for maximum performance with thousands of protections enabled. Dynamic Threat Management With the IPS Software Blade and the SmartEvent Software Blade you gain a new, dynamic management paradigm for today’s high volume, real-time and evolving threat environment. Check Point threat management workflows allow you to handle constant change quickly and efficiently, reducing your management overhead and allowing you to confidently and promptly deploy protections. The IPS Software Blade offers:
  • New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.
  • Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.
  • Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.
  • Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.
  • Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.
  • Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.
  • Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.
... Learn more
ROI-calculator
Configurator
ROI-
-
20
2
logo
Offer a reference bonus
2.00

Check Point Next Generation Firewall (NGFW)

Benefits Detects and controls application usage
  • Identify, allow, block or limit usage of applications, and features within them
  • Enable safe Internet use while protecting against threats and malware
  • Leverage the world's largest application library with more than 6,600 web 2.0 applications
Supports advanced identity awareness for stress-free policy enforcement
  • Create granular policy definitions per user and group
  • Integrate seamlessly with Active Directory
  • Protect environments with social media and Internet applications
Provides proven gateway security in a single, dedicated appliance
  • Rely on 24/7 advanced protection
  • Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities
  • Get greater understanding into security events with integrated, easy-to-use centralized management
  • Join more than 170,000 customers, including 100 percent of Fortune 100 companies
Features Identity awareness Great security involves limiting and tracking access to sensitive data and resources. With the Next Generation Firewall, your administrators get detailed visibility into the users, groups, applications, machines and connection types on your network so they can assign permissions to the right users and devices. The firewall makes it easy and cost-effective to enforce security policy, giving granular permission control over these entities; this results in superior protection across the entire security gateway. Seamless and agent-less integration with Active Directory provides complete user identification, enabling simple, application-based policy definition per user or group directly from the firewall. Users’ identification may be acquired in one of three simple methods:
  • Querying the Active Directory
  • Through a captive portal
  • Installing a one-time, thin client-side agent
Application control Employees are using more apps than ever, and you’re on the hook to protect them regardless of what they use. Check Point Next Generation Firewall has the industry’s largest application coverage, with more than 6,600 applications and 260,000 social network widgets included. You can create granular security policies based on users or groups to identify, block or limit usage of web applications and widgets like instant messaging, social networking, video streaming, VoIP, games and more. Logging and status To help you make sense out of your security event data, we included SmartLog, an advanced log analyzer that delivers split-second search results providing real-time visibility into billions of log records over multiple time periods and domains. Integrated security management Our unified security management simplifies the monumental task of managing your security environment. You’ll see and control threats, devices and users with a highly intuitive graphical interface providing views, details and reports on your security health. Manage all your Check Point gateways and software blades from one comprehensive, centralized security dashboard. Intrusion prevention Next Generation Firewall includes the Check Point IPS Software Blade, which secures your network by inspecting packets traversing through the gateway. It is a full-featured IPS, providing geo-protections and frequent, automated threat definition updates. Because the IPS is part of the integrated Software Blade Architecture, you’ll get all the deployment and management advantages of a unified and extensible solution.
... Learn more
ROI-calculator
Configurator
ROI-
-
1
1
logo
Offer a reference bonus
2.00

Check Point SandBlast

Check Point SandBlast Agent provides purpose-built advanced Zero-Day Protection capabilities to protect web browsers and endpoints, leveraging Check Point’s industry leading network protections.SandBlast Agent ensures complete real-time coverage across threat vectors, letting your employees work safely no matter where they are without compromising on productivity. Threat Emulation capability emulates unknown files in contained environment to detect malicious behaviors and prevent infections while Threat Extraction provides sanitized risk-free files to the users instantly.

Anti-Ransomware protection stops ransomware in its tracks and reverses the damage automatically, ensures organizations are protected against malicious extortion attacks that encrypt business data and demand ransom payment for its retrieval. Zero Phishing proactively blocks access to new and unknown deceptive websites and safeguards user credentials by preventing the use of corporate passwords on external websites.

SandBlast Agent captures forensics data with continuous collection of all relevant system events, and then provides actionable incident analysis to quickly understand complete attack lifecycle. With visibility into the scope, damage, and attack vectors, incident response teams maximize productivity and minimize organizational exposure.

Features:

  • Threat Emulation: Evasion resistant sandbox technology
  • Threat Extraction: Delivers sanitized risk-free files to users in real-time
  • Anti-ransomware: Prevents and remediates evasive ransomware attacks
  • Zero-Phishing: Blocks deceptive phishing sites and alerts on password reuse
  • Anti-Bot: Identify and isolate infected hosts
  • Anti-Exploit: Protects applications against exploit based attacks
  • Behavioral Guard: Detects and blocks malicious behaviors
  • Endpoint Antivirus: Protects against known malware
  • Forensics: Records and analyzes all endpoint events to provide actionable attack forensics reports

Benefits:

  • Advanced threat protection and automated endpoint forensic analysis for all malware types
  • Prevents and remediates evasive ransomware attacks
  • Proactively blocks known, unknown and zero-day malware
  • Provides instant actionable understanding of attacks
  • Automatically remediates infections
  • Protects users credentials
... Learn more
ROI-calculator
Configurator
ROI-
-
12
3
logo
Offer a reference bonus
2.00

Check Point vSEC Virtual Edition

Secure virtual environments Multi-layered security protections for virtual environments including next-generation firewall and advanced threat prevention Inspect all traffic—from inter-VM to perimeter—in the virtual network Permit secure access to remote systems and networks Unified management of virtual and physical environments Consistent security policy and uniform security management across both physical and virtual infrastructures Visibility into virtualization configuration and security changes Separation of duties between virtualization and security teams Licensing is based on virtual cores used and supports dynamic allocation ideal for elastic workloads Thanks to Check Point vSEC Virtual Edition (VE), we have a virtual security solution that fully integrates into our dynamic virtualized environment with all the performance, security and functionality we’ve expected from our physical Check Point gateways for years. Features Full protections with Check Point Software Blades Check Point vSEC Virtual Edition provides the full protections of the Check Point Software Blade architecture. Firewall, IPS, Antivirus, Anti-Bot Software Blades protect services in the public cloud from unauthorized access and attacks. Application Control Software Blade helps prevent application layer denial of service attacks and protects your cloud services. IPsec VPN Software Blade allows secure communication into cloud resources. Mobile Access Software Blade allows mobile users to connect to the cloud using an SSL encrypted connection with two factor authentication and device pairing. Data Loss Prevention Software Blade protects sensitive data from theft or unintentional loss. SandBlast Zero-Day Protection Blades provide the most comprehensive protection against malware and zero-day attacks. Consolidated logs and reporting for hybrid cloud environments Get visibility and enforcement across your virtual infrastructures using the Next Generation SmartEvent Software Blade. Simplify compliance and audits with unified logs and reporting. Centralized management for virtual and physical infrastructures Manage vSEC VE using your existing on-premise Check Point Unified Security Management Solution. Enforce a consistent security policy for corporate assets across both virtual and physical infrastructures from a single console.
... Learn more
ROI-calculator
Configurator
ROI-
-
1
18
logo
Offer a reference bonus
2.00

Fast and Scalable Compute Resources

Oracle Cloud Infrastructure compute instances are the building blocks for applications from small websites to the largest enterprise applications. The main shapes each have use cases for which they are especially suitable:
Virtual machine (VM) instances offer compute resources in many shapes, from a single OCPU to 24 OCPUs, catering to a variety of workloads and software architectures. All Oracle Cloud Infrastructure VM shapes support remote block storage, but the Dense I/O shapes also offer up to 25.6 TB of local NVMe SSD storage for applications requiring low latency, millions of IOPS, and high local storage capacity.
Bare metal instances support applications requiring intensive compute and large memory resources. You can build cloud environments with performance equal or better than other clouds or on-premises infrastructure. Bare metal provides customers with exceptional isolation, visibility, and control.
Accelerated computing requires consistently fast infrastructure across every service. With GPU instances you can process and analyze massive data sets more efficiently, making them ideal for complex machine learning (ML), artificial intelligence (AI) algorithms, and many industrial HPC applications.
... Learn more
ROI-calculator
Configurator
ROI-
-
14
17
logo
Offer a reference bonus
2.40

Hitachi Content Platform Anywhere

Mobilize Your Workforce, Minimize Your Risks MOBILIZE YOUR ENTERPRISE DATA Transform to a digital workplace for greater efficiency and workforce engagement Ensure that data is properly protected, and meet regulatory requirements for access, preservation, security and auditing Increase worker productivity through collaboration tools and anytime, anywhere, any device access to data Empower Your IT to Deliver Its Own Mobility Solution SECURE, INTEGRATED MOBILITY SOLUTION Mobilize data in existing NAS and content management systems, and transform from traditional to cloud-based home directories Protect end-user data and easily recover from device failures, user error and threats such as ransomware Create a digital workplace with cloud home directories, collaboration tools and rich APIs to satisfy diverse needs and avoid the risks of shadow IT Advantages SECURE Mobilize Data Without Compromising Security and Visibility Retain Visibility and Control of Your Data Adhere to compliance and governance policies, all while securing access from anywhere. Diminish Shadow IT and Unsanctioned Application Use Deliver the public cloud services users need and the collaborative tools they want from your own cloud environment. Safeguard End-User Data Protect, secure and easily recover data on end-user devices. SIMPLE Empower Your Workforce With Intuitive Collaboration Tools Anytime, Anywhere, Any Device Access to Data Sync and share across PC, Mac, iOS, Android, Windows Phone® or any web-enabled device through the HCP Anywhere user portal. Avoid Mailbox Quota and File-Size Limitations Plug-in for Microsoft® Outlook® converts attachments into shared links, reducing mailbox size and enabling collaboration on files as large as 2TB. Streamline Deployment for Enterprise Environments Easily deploy software within existing IT environments while supporting antivirus, device management and user authentication services, automatic client updates and user self-service. SMART Optimize Savings for the Long Term Provide Mobile Access to Corporate File Shares Extend mobile access to data in existing NAS devices, including Hitachi Data Ingestor, Hitachi NAS Platform, EMC, NetApp and Microsoft® Windows® servers. Reduce Your Help Desk Burden Self-service features let users manage devices, file sharing and data recovery themselves while the service automatically stores and protects end-user data. Store Data Efficiently Share links to files instead of attachments to reduce network load; deduplicate and compress data to reduce storage needs. FLEXIBLE Turnkey Mobility Platform Designed for Your Business Deliver Private, Hybrid or Public Cloud Storage Services Offer a range of file services from a single solution extending from your data center to remote offices and end users. Customize for Your Business Needs Tailor the solution based on your unique sharing policies, quotas, and governance rules and apply your own logos and branding. Transform to a Digital Workplace Software development kits and rich APIs let you build your own apps and workflows with built-in collaboration, data protection and compliance tools.
... Learn more
ROI-calculator
Configurator
ROI-
-
14
0
logo
Offer a reference bonus
0.00

Hitachi TagmaStore™ Adaptable Modular Storage Model AMS500

Enterprise-class Solutions for SMB Customers Small-to-midsized businesses (SMBs) are facing big-company challenges of escalating data growth, availability, and protection as well as regulatory compliance and complex storage infrastructures. With many years of experience serving FORTUNE 500 companies, Hitachi Data Systems understands these challenges and has developed Application Optimized Storage™ solutions to match application requirements to storage attributes. Now Hitachi Data Systems brings SMB customers these proven solutions in modular, cost-effective packaging—including the Hitachi TagmaStore™ Adaptable Modular Storage model AMS500.
Business Benefits
Gain high-end performance and capacity, priced for the midrange
  • Move from server-internal storage to scalable external storage, consolidate multiple storage systems into one, or build a first storage area network (SAN); either iSCSI or Fibre Channel connectivity supported.
  • Use NAS connectivity options for collaborative file-sharing applications.
  • Deliver application-specific performance, availability, and protection across systems—from a few terabytes to more than 86TB (SATA intermix drives) or 64TB (Fibre Channel drives).
  • Use advanced features—Cache Partition Manager and RAID-6—to help improve performance, reliability, and usability.
  • Partition and dedicate cache to maximize performance of high-I/O applications.
  • Support outstanding performance for virtually any workload, with 2,048 logical units (LUNs).
  • Choose between SATA intermix and Fibre Channel to host any workload on the most economical storage system.
Consolidate storage, anticipate growth
  • Consolidate and centralize management to reduce costs.
  • Scale to 86.9TB of SATA and Fibre Channel intermix or to 64.7TB of Fibre Channel storage capacity.
Meet compliance requirements, protect data, and reduce recovery times
  • Enhanced SATA data protection provides unmatched data availability and resiliency.
  • RAID-6 ensures high availability and flexibility in RAID group rebuild.
  • Hi-Track® “call-home” service/remote maintenance tool for 24/7 diagnostics keeps potential issues from becoming problems.
  • Fully redundant and hot-swappable components keep your applications online.
  • Within-system volume replication or incremental copies provide frequent and nondisruptive backups.
  • Remote replication is enabled by Hitachi TrueCopy™ Remote Replication software.
Build a first storage network or extend an existing one
  • Plug-and-play SAN Kits for Microsoft Simple SAN and SAN Starter solutions for easy deployment
  • Diskless boot for SAN-attached servers
  • High-capacity storage for network attached storage (NAS) applications
  • Systems management and configuration using Storage Management and Hitachi HiCommand® Suite software
Leverage for SMB applications or enterprise tiered storage deployments
  • Microsoft Exchange Server, ERP, CRM, database, NAS filer, backup applications, or tape replacement
  • Archival and long-term tamperproof data retention to meet regulatory requirements
  • Complete data lifecycle management solutions within a tiered storage environment when combined with Hitachi enterprise-class storage
... Learn more
ROI-calculator
Configurator
ROI-
-
0
9
logo
Offer a reference bonus
2.00

HITACHI UNIFIED STORAGE VM

The HUS VM is supported by Hitachi Command Suite software as part of a single management platform that integrates with VMware, Microsoft SQL Server, Microsoft Office SharePoint Server, Microsoft Exchange Server and VMware View (VDI). Additional HUS VM plug-ins and adapters will help administrators integrate HUS VM with Microsoft System Center, Oracle Enterprise Manager and VMware vCenter. Hitachi has developed HUS VM to support increasing SME needs for external virtualized capacity and what Hitachi says will be the highest single home directory size among comparable storage solutions. According to Hitachi, the HUS VM can also manage the largest volumes in its class and decreases the time needed to manage growth of large file systems. Hitachi will now also include HUS VM partner training into its TrueNorth Partner Scholarship Program at the Hitachi Data Systems Academy.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
16
7
logo
Offer a reference bonus
2.70

Hitachi Universal Storage Platform V

Universal Storage Platform V Specifications [9] Frames (Cabinets) - Integrated Control/Drive Group Frame and 1 to 4 optional Drive Group Frames Universal Star Network Crossbar Switch - Number of switches 8 Aggregate bandwidth (GB/sec) - 106 Aggregate IOPS - Over 4 million Cache Memory - Number of cache modules 1-32, Module capacity 8 or 16GB, Maximum cache memory 512GB Control/Shared Memory - Number of control memory modules 1-8, Module capacity 4GB, Maximum control memory 28GB Front End Directors (Connectivity) Number of Directors 1-14 Fibre Channel host ports per Director - 8 or 16 Fibre Channel port performance - 4, 8 Gbit/s Maximum Fibre Channel host ports - 224 Virtual host ports - 1,024 per physical port Maximum IBM FICON host ports - 112 Maximum IBM ESCON host ports - 112 Logical Devices (LUNs) — Maximum Supported Open systems 65,536 IBM z/OS 65,536 Disks Type: Flash 73, 146, 200 and 400GB Type: Fibre Channel 146, 300, 450 and 600GB Type: SATA II 1TB, 2TB Number of disks per system (min/max) 4-1,152 Number spare disks per system (min/max) 1-40 Maximum Internal Raw Capacity - (2TB disks) 2,268 TB Maximum Usable Capacity - RAID-5 Open systems (2TB disks) 1,972 TB z/OS-compatible (1TB disks) 931 TB Maximum Usable Capacity — RAID-6 Open systems (2TB disks) 1,690TB z/OS-compatible (1TB disks) 796 TB Maximum Usable Capacity — RAID-1+ Open systems (2TB disks) 1,130TB z/OS-compatible (1TB disks) 527.4TB Other Features RAID 1, 10, 5, 6 support Maximum internal and external capacity 247PB Virtual Storage Machines 32 max Back end directors 1-8 Operating System Support Mainframe - Fujitsu: MSP; IBM z/OS, z/OS.e, z/VM, zVSE, TPF; Red Hat; Linux for IBM S/390 and zSeries; SUSE: Linux Enterprise Server for System z. Open systems - HP: HP-UX, Tru64 UNIX, Open VMS; IBM AIX; Microsoft Windows Server 2000, 2003, 2008; Novell NetWare; SUSE Linux Enterprise Server; Red Hat Enterprise Linux; SGI IRIX; Sun Microsystems Solaris; VMware ESX and Vsphere, Citrix XENserver
... Learn more
ROI-calculator
Configurator
ROI-
-
0
2
logo
Offer a reference bonus
2.00

Hitachi Virtual Storage Platform G1000

Hitachi Virtual Storage Platform G1000 is a unified storage system that provides high performance, high availability, and reliability. VSP G1000 scales to meet the demands of IT organizations’ ever-increasing workloads. When combined with server virtualization, the mission-critical storage virtualization of VSP G1000 supports a new breed of applications at cloud scale while reducing complexity. The following key features illustrate how VSP G1000 provides a Continuous Cloud Infrastructure for the enterprise: • Global storage virtualization enables an always-on infrastructure with enterprise-wide scalability that provides a complete separation between host and storage. The scalability is independent of connectivity, location, storage system, or vendor. Remote data center replication support allows provisioning and management of virtual storage machines up to 100 meters apart. • Integrated active mirroring enables volume extensibility between systems and across sites through the provisioning and management of active-active volumes up to 100 km apart. Combined with remote data center replication, this mirroring is an ideal solution for critical applications that require zero recovery point and recovery time objectives. Active mirroring is enabled by the Hitachi global-active device feature. • Unified storage with enterprise scalability allows you to centrally manage multivendor storage resources across all virtualized internal and external storage pools, whether deployed for SAN, NAS, or object storage. • Unified storage management software (Hitachi Command Suite) simplifies administrative operations and streamlines basic management tasks. • Hitachi Accelerated Flash storage offers a patented data center-class design and rack-optimized form factor that delivers more than 600 TB per system. It supports a sustained performance of 100,000 8K I/O operations per second per device, with fast and consistent response time. • Server virtualization integration with leading virtual server platforms provides end-to-end visibility, from an individual virtual machine to the storage logical unit, protecting large-scale multivendor environments
... Learn more
ROI-calculator
Configurator
ROI-
-
1
16
logo
Offer a reference bonus
2.00

NetSuite

NetSuite features include: •Customer Relationship Management - Sales Force Automation - Marketing Automation - Customer Support and Service - Incentive Management - Offline Sales Client - Partner Relationship Management •Financials/ERP - General Ledger - Accounts Receivable, Accounts Payable - Advanced Financials - Revenue Recognition - Budgeting - Multi-currency - Order Management and Fulfillment - Time and Billing - Purchasing - Inventory Management - Drop Shipment/Special Order - Integrated FedEx® Shipping Functionality - Integrated UPS OnLine® Shipping Tools - Standard, Customizable Reports •Ecommerce - Database Driven Web Site/Web Store - Front- and Back-Office Integration - eBay Integration - Credit Card Processing, PayPal - Affiliate Marketing - Customer Acquisition - Customer, Partner Self-Service - Web Site Analytics •Employee Management and Productivity - Role-based Dashboards - Group Calendaring and Collaboration - Employee Records - Expense Reporting, Purchase Requisitions - Employee Self-Service NetSuite is the first solution to deliver on the promise of intelligent, integrated and simpler applications for growing and midsize businesses. NetSuite is intelligent. The system holds all corporate data in a single database, giving you access to your key performance metrics on a customizable, real-time dashboard. As a result, NetSuite enables you to make better, faster decisions. NetSuite is integrated. Within a single, powerful application, it combines complete customer-facing CRM and Ecommerce capabilities with back-office Accounting/ERP and self-service portals for partners. As a result, it allows companies to unite fragmented data and automate processes from end to end. NetSuite is simple. With NetSuite, implementations are both faster and less expensive than traditional business applications. Modularity enables phased implementations according to your company’s need. In addition, click not code and advanced customization supports business as you define it. As a Web-based on-demand solution, NetSuite significantly reduces your total cost of ownership (TCO). Why NetSuite? Unify Business Processes across the Enterprise With a single, integrated platform for CRM, Accounting/ERP and Ecommerce, you can automate key business functions across all departments, including sales, marketing, service, finance, inventory, order fulfillment, purchasing, and employee management. Your employees no longer have to re-enter data in different systems, rectify inconsistent or inaccurate data, or wait for batch updates. Instead, all your employees view and share accurate data in real time, leading to greater collaboration among departments and increased productivity across your business. Increase Visibility for Better Decision Making Customizable Dashboards offer real-time access to key performance metrics, supporting intelligent, timely business decisions. In addition, full visibility into unified customer records results in more efficient and highly personalized sales, fulfillment, and service processes. Extend Processes to Customers, Suppliers, and Partners Given today’s need to work closely with partners through an extended enterprise, NetSuite offers selfservice portals that enhance both B2B and B2C collaboration. In addition, proactive notification of partner-specific events accelerates process cycles and improves responsiveness, ensuring your position as a preferred partner. Customize and extend NetSuite with SuiteFlex NetSuite is the world’s most customizable ASP. Click not code configuration and modular implementations jumpstart your business on NetSuite. Advanced customization with simpler, industry standard tools allows you to tailor business practices and processes to meet your specific company and industry requirements. Because our customization carries forward seamlessly with upgrades, we actually encourage you to highly customize NetSuite—make it your one-of-a-kind software application. Get Superior Value with an Affordable Solution Built from the ground up for growing and midsize businesses, NetSuite offers affordable pricing, accelerated implementation, and comprehensive support packages that results in unbeatable TCO. Plus, you eliminate the costly and time-consuming integration often associated with using a patchwork of disconnected systems. NetSuite also provides leading-edge professional services and educational programs that ensure efficient implementation and continued, long-term success.
... Learn more
ROI-calculator
Configurator
ROI-
-
2
13
logo
Offer a reference bonus
2.00

NSX SD-WAN by VeloCloud

VMware NSX SD-WAN by VeloCloud enables enterprises to support application growth, network agility and simplified branch implementations while delivering optimized access to cloud services, private data centers and enterprise applications simultaneously over both ordinary broadband Internet and private links. NSXSD-WAN combines the economics and flexibility of a hybrid WAN with the deployment speed and low maintenance of a cloud-based service. It includes policy-based network-wide application performance, visibility and control while dramatically simplifying the WAN by delivering virtualized services from the cloud to branch offices. The VMware NSX SD-WAN Edge by VeloCloud appliance is a compact, thin edge device that is zero-touch provisioned from the cloud for secure,optimized connectivity to applications and data. The NSX SD-WANEdge is also available as a VNF (virtual network function) for instantiation on a virtual CPE platform. The NSX SD-WAN Edge with Dynamic Multi-Path Optimization (DMPO) and deep application recognition aggregates multiple links (e.g. Private, Cable, DSL, 4G-LTE) and steers traffic over the optimal links to other on-premises NSX SD-WAN Edges in branch offices, private data centers, campuses, and headquarters. The NSX SD-WAN Edge can also optionally connect to the system of global VMware NSX SD-WAN Gateway by VeloCloud to provide performance, security,and visibility for cloud services (SaaS, IaaS, B2B Internet). This system of NSX SD-WAN Gateways is deployed globally at top-tier cloud data centers to provide scalable and on-demand cloud network services. NSX SD-WAN Gateways implement NSX SD-WAN DMPO, cloud VPN and NSX SD-WAN Multisource Inbound Quality of Service between global cloud services (SaaS, IaaS, network services) and each NSX SD-WAN Edge, enabling multiple broadband and private leased lines to appear as a single, high-performance WAN. The cloud-based VMware NSX SD-WAN Orchestrator by VeloCloud is used to provision network-wide business policy, enable services insertion, perform real-time monitoring,and analyze application performance. Deploy in Minutes Using NSX SD-WAN’s zero-touch deployment capability, NSX SD-WAN can be quickly installed. The NSX SD-WAN Edge is shipped to the branch office where a non-technical person simply plugs in power and a few cables. Activation, configuration, and ongoing management are all handled in the cloud. Enterprise-wide Business Policies NSX SD-WAN makes setting policy as simple as a single click. Enterprises or their managed service providers can define business level policies that apply enterprise wide across many Edges, all througha centralized, cloud based NSX SD-WAN Orchestrator. Link steering, link remediation and QoS are all applied automatically based on the business policies; however specific configuration overrides may also be applied. The centralized NSX SD-WAN Orchestratoralso provides an enterprise wide view and configurability of routing in an overlay flow control table, eliminating complex node by node route configurations. SDN for the WAN NSX SD-WAN brings SDN concepts to the enterprise branch WAN. Business policies implemented across the logical overlay deliver abstraction of application flows from the underlying physical transport. Agility is achieved based on adjusting forwarding to meet policy as well as real-time link conditions. NSX SD-WAN has a distributed control plane for forwarding decisions to be made locally with context, so there are no latency issues nor points of failure across the WAN. Yet each NSX SD-WAN node receives centralized control policies for easy programmability and enterprise wide visibility. A software based approach enables the flexibility and portability of deploying virtual NSX SD-WAN Edges on off-the-shelf x86 based hardware or as virtual network functions (VNFs) on virtual CPEs. Management is configurable via both a GUI and a Rest API. Solution Benefits The WAN is in transition as enterprises seek to improve agility and economics, and adapt to the shift of applications to the cloud. NSX SD-WAN offers enterprise-grade performance, security, visibility, and control over both public Internet and private networks.NSX SD-WAN dramatically simplifies the WAN with zero touch deployment, one-click business policy and services insertion, and cloud-based network as a service.
... Learn more
ROI-calculator
Configurator
ROI-
-
17
17
logo
Offer a reference bonus
2.00

Oracle Adaptive Intelligent Apps

Adaptive Intelligent Apps Characteristics Data and Context-Driven Process enormous amounts of web-scale data in real-time and synthesizes context to deliver the best and most personalized outcomes. Action-Oriented and Omni-Channel Anticipate user behaviors and deliver actionable and individualized outcomes. Data and events are tracked from everywhere so recommendations are coordinated across channels. Continuously Adaptive and Self-Learning Continuously improves outcomes as the system reacts, learns and adapts. There is a value exchange between the end user and the adaptive intelligent app—the more the end user interacts, the more value they receive. Built for Business Users Immediate value out of the box, with no need for a legion of data scientists! Adaptive Learn from your behavior and "others like you" in the moment. React, change, and adapt based on continued use—click by click. Deliver increasingly relevant and optimized outcomes in real-time. Intelligent Process and derive insights from web-scale 3rd-party data. Synthesize context: weather, life events, real-time actions, social activity, and much more. Identify and serve up—in real-time—the best individualized outcomes.
... Learn more
ROI-calculator
Configurator
ROI-
-
2
10
logo
Offer a reference bonus
2.00

Oracle Beehive

Oracle BeehiveOnline helps groups within Oracle share information and better collaborate with partners and customers.

In a scalable and secure environment, Oracle BeehiveOnline offers a range of integrated collaboration services including team workspaces, shared document repositories, scheduling, web conferencing and more. It improves team productivity, boosts the speed and quality of decision making, and improves the reuse of information.

... Learn more
ROI-calculator
Configurator
ROI-
-
9
2
logo
Offer a reference bonus
2.00

Oracle Business Intelligence

Scale Insights with Ease Gain a comprehensive view of your business—in one place Deliver instant clarity through stunning visual analytics Adopt the cloud your own way, with in the cloud, hybrid, or on-premises deployment
... Learn more
ROI-calculator
Configurator
ROI-
-
7
6
logo
Offer a reference bonus
2.00

Oracle CASB Cloud Service

The Oracle CASB Cloud Service is the only Cloud Access Security Broker (CASB) that gives you both visibility into your entire cloud stack and the security automation tool your IT team needs. Threat Detection Identify existing threats to your cloud footprint by leveraging real-time threat intelligence feeds and machine learning techniques to establish security baselines and to learn behavior patterns. Predictive Analytics Stay a step ahead of threats with patent-pending modeling techniques that evaluate risks across hundreds of threat vectors to provide you with a concise summary of potential threats. Automated Incident Response Keep enterprises secure by automating responses to threats with forensics, incident management, orchestration and remediation through native capabilities as well as integration with existing technologies. Security Configuration Management Eliminate labor intensive, error prone manual processes and manages security configurations within cloud applications by asserting configurations as well as continuously enforcing them.
... Learn more
ROI-calculator
Configurator
ROI-
-
18
19
logo
Offer a reference bonus
2.40

Oracle Cloud Applications

Oracle Cloud Applications are complete, future-proof, and trusted, enabling modern business transformations. With Oracle Applications, create differentiated products and services, enter new markets and respond to global demand, delight customers and drive loyalty, all while infusing business and IT operations with adaptive intelligence, standardized business processes, at lower cost and complexity. Oracle Cloud is built for your entire business, with applications that you can consume as your business grows. With Oracle, you can start at the edge or perform a complete transformation.
  • Applications (SaaS): Oracle offers the most complete, innovative, and proven cloud suite of SaaS applications that enable customers to transform their business with the latest intelligent technologies such as AI and machine learning.
  • Data (DaaS): Oracle Data Cloud provides data from a wide variety of Oracle and third-party sources, which can be used by sales and marketing to produce better business outcomes.
  • Platform (PaaS): Oracle offers the broadest range of PaaS services in the industry, which enable developers, IT professionals, and business leaders to develop, extend, and secure applications that leverage advanced analytics.
  • Infrastructure (IaaS): Oracle offers the highest performance, lowest cost IaaS in the industry, enabling customers to run their application workloads in the Oracle Cloud.
Oracle's complete suite is built on a single data model that connects end-to-end business processes and helps customers transform their business with intelligence.
  • Oracle empowers all sizes of companies, from startups to global enterprises.
  • Choose from more than 1,000 cloud applications, translated to 35 languages and used in 175 countries. 
Oracle Delivers Continuous Innovation to FUTURE PROOF Your Investment Backed by 40,000 cloud developers and 17,000+ technology patents, Oracle defines innovation.
  • Enhance your business IQ with adaptive intelligence. With decision science and machine learning embedded directly into business processes, business leaders can focus on managing their business outcomes rather than managing new technology. Examples include dynamic demand forecasts (SCM), personalized offers (CX), adaptive buy signals (ERP), and optimal candidates (HCM).
  • Utilize Internet of Things (IoT) cloud offerings to increase existing business application value with intelligent data and predictive analytics.
  • Leverage Oracle's mobile apps to manage the business and increase productivity while improving employee work-life balance through location flexibility.
  • In addition, use Oracle's integrated cloud tools to extend or build new business processes.
Oracle Offers a TRUSTED Cloud Platform More than 25,000 business customers rely on Oracle's cloud every day—29+ million weekly active users and 57+ billion daily transactions. Oracle is designed to be secure at every layer—role-based access, global access controls, backup and redundancy, local data residency, 24x7 Oracle security experts, data center man traps, and biometric IDs.
  • UBS securely delivers HR services to its 60,000 employees worldwide
Oracle modernizes and standardizes business processes in most countries across the globe.
  • HSBC streamlined and secured global business processes across in 72 countries.
  • Esterline consolidated 120+ ledgers, 12 currencies, and 30 chart of accounts.
Oracle delivers results—on time and on budget.
  • GE Digital went live on Enterprise Resource Planning Cloud in 5 months
  • FEMSA Logistica went live on Supply Chain Management Cloud in 12 weeks
  • Blackboard went live on Human Capital Management Cloud in 6 months
  • ClubMed went live on Service Cloud in 12 weeks
Leverage shared expertise through one of the largest, most vibrant communities of customers and partners.
... Learn more
ROI-calculator
Configurator
ROI-
-
16
5

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.