View
Sorting
Products found: 257
Acronis Backup
Acronis Backup is a fast, scalable and reliable backup solution for files, applications, and complete systems.
Acronis Backup is highly customizable, allowing you to set up whatever type of backup solution you need, including on-location, cloud-based or hybrid.
The company can back up data from servers, mobile devices, cloud platforms and virtual machines. Acronis is also flexible in its backup options, allowing you to back up to a different cloud storage platform, if you prefer.
You can set up quick incremental and differential backups of your servers with options to back up your network on local, remote and cloud locations. All the while, the data deduplication feature ensures that your backup doesn't consist of copies, which keeps storage requirements more manageable. In addition, you can encrypt your backups with three options: 128-bit, 192-bit and 256-bit AES cipher encryption. This means that you can store your archived backups off-site without fear of the data being stolen.
Acronis includes several features for protecting and backing up your virtual environment. It integrates with the most popular and used virtual platforms, including VMWare vSphere, Microsoft Hyper-V, Citrix XenServer, Linux KVM and Oracle VM Server.
One of the best features of Acronis Backup Advanced is the instant recovery, or recovery in place. This recovery feature launches the backed-up data onto a virtual server so that users can still access the data while you work to restore the original server. There is virtually no downtime.
In addition, the disk-imaging restoration allows you to store entire disks to dissimilar hardware on a granular level. This allows you to convert backups of physical servers to virtual machines (physical to virtual) and convert work in progress from those virtual machines back to bare metal (virtual to physical) and even dissimilar hardware.
You can implement backup and recoveries from anywhere in the world, as long as you are on a computer with an internet connection. When you combine this with the wake-on-LAN feature, you can essentially access any computer connected to your network and run backups without physically accessing the computers.
Acronis Backup Advanced for Windows Server
Acronis True Image
- Back up. Use cloning and imaging to make a duplicate of your system, capturing all of your data for disk migration or system recovery
- Store. Back up to a local drive and to the cloud for the Dual Protection of always having on-site and off-site copies available
- Restore. Quickly recover your whole system or a specific file with confidence, knowing that the backup is as good as the original
- Cover Everything. With one solution you can safeguard PCs, Macs, iOS and Android devices as well as your social media accounts
- Two-Click Protection. Protect everything by choosing where to store your data and creating a full image backup in just two clicks
- Visual Dashboards. Know at a glance the size of your backup, the types of files, and how many ransomware attacks have been stopped
Aruba Switch
The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.
Azure Data Warehouse
Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.
Get rid of worries
Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.
Azure Resiliency
- Availability Zones
- Availability sets
- Virtual Machine Scale Sets (VMSS)
Azure Virtual Machines
Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling.
Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.
Barracuda Backup
Barracuda CloudGen Firewall
- Protection Against Advanced Threats and Zero-Hour Attacks.
- Secure SD-WAN: Reduce Costs and Ensure Application Availability.
- Remote VPN Access for Off-Network Users – Anytime, Anywhere.
- Secure Migration to the Public Cloud and Hybrid Environments.
- Secure Connectivity for IoT Devices and Industrial Control Systems.
- Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
- VPN across multiple broadband connections and MPLS replacement
- Up to 24 physical uplinks to create highly redundant VPN tunnels
- Replacing network backhauling central policy enforcement architectures with direct internet breakouts
- Faster access to cloud applications like Office 365 by dynamically prioritizing them over non-critical traffic
- Guaranteed user access to critical applications through granular policy controls
- Increased available bandwidth with built-in traffic compression and data deduplication
- Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Barracuda Email Security Gateway
Barracuda Load Balancer
Barracuda Message Archiver
Barracuda NextGen Firewall (NGFW)
- Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance
- VPN across multiple broadband connections and MPLs replacement
- Up to 24 physical uplinks to create highly redundant VPN tunnels
- Replacing network backhauling central policy enforcement architectures with direct internet break outs
- Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic
- Guaranteed users' access to critical applications through granular policy controls
- Increased available bandwidth with built-in traffic compression and data deduplication
- Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic
Barracuda PhishLine
Fight phishing and other potentially devastating attacks that can slip through security gateways. These evolving and sophisticated attack techniques, designed to fool employees, put your business at risk for data loss, financial fraud, and embarrassing exposure. Transform employees into a layer of defense with Barracuda PhishLine.
With PhishLine, you guard against every facet of social-engineering threats with continuous simulation and training for employees. Expose them to the latest attack techniques, and teach them to recognize the subtle clues and help stop email fraud, data loss, and brand damage. Embed learning into your everyday business processes with customized simulations that test and reinforce good behavior.
Only PhishLine helps you guard against a range of threats with patented, highly-variable attack simulations for multiple vectors, including phishing, smishing, vishing, and found physical media.
Barracuda PhishLine trains users to understand and respond correctly to the latest phishing techniques, recognize subtle phishing clues, and prevent email fraud, data loss, and brand damage. It transforms employees into a powerful line of defense against damaging phishing attacks.
This versatile, scalable, cloud-hosted SaaS solution includes hundreds of email and landing-pages templates, updated based on threat trends. Levelized training and gamification make it more effective by engaging employees.
Phishing Training
Barracuda PhishLine uses advanced, automated education technology that includes simulation-based training, continuous testing, powerful reporting for administrators, and active incident response awareness.
Phishing Simulation
Simulated phishing attacks are constantly updated to reflect the most recent and most common threats. Simulations are not limited to email, but also include voice, SMS, and portable-media (USB stick) attacks. Templates let you customize simulations.
Phishing Reporting
Barracuda Phishline provides advanced analytics and reporting tools that enable you to identify how effective your training is and how users react to actual phishing attacks that may slip through other defenses.
Patented Simulations
PhishLine's patented attack simulations train your employees to spot email threats that can compromise data and result in financial and reputational loss. A/B tests prevent users from receiving duplicate simulations.
Total Email Protection Portfolio
PhishLine is part of Barracuda’s Total Email Protection portfolio, delivering truly comprehensive email security.
Curated Content
PhishLine Content Center Marketplace™ provides dozens of simulation templates, landing pages, risk-assessment surveys, and other training content. New, customizable content is added daily, to reflect current threat trends.
Gamification
PhishLine boosts user engagement with gamification. Videos, infographics, newsletters, and other materials supplement core training.
Levelized Programs
As employees progress through their training program, the content constantly changes, challenging them to continuously improve their phishing detection and reporting skills.
PhishLine Concierge Service (Optional)
PhishLine Concierge is an optional service that offloads the complex tasks of defining, configuring, executing, and analyzing your simulation campaigns to a dedicated consultant, to minimize your resource overhead.
Barracuda Sentinel
Identify and Secure Your Highest-Risk Individuals Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. Part of a Complete Email Protection Platform With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. Sentinel Detects Threats that Email Security Gateways Can't Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. Protect Your Business Against Account Takeover Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. Features Stop Targeted Attacks with AI
- Prevent Spear Phishing
- Prevent BEC and CEO Fraud
- Detect Employee Impersonation
- Stop Zero-Day Phishing
- Detect Web Impersonation
- Stop Inbound Spoofing
- Continuous Learning
- Exportable Reports
- Alerting for Account Takeover
- Prevent Account Takeover Infiltration
- Detect Compromised Emails
- Delete Emails Sent Internally
- Notify External Recipients
- Lock Attackers Out of Accounts
- Prevent Third Party Domain Spoofing
- Automated DMARC Reporting
- DMARC Aggregation and Visualization
- DKIM/SPF Configuration and Troubleshooting
- Better Email Deliverability
- Spoofed Email Reports
- Detect Misconfigured Legitimate Senders
- Protects Customer Brands
- Exportable Reports
- Lightweight Architecture
- Instant Setup
- Works with Any Gateway
- Historical Assessment
- Test Employee Security Awareness
- 80 Real-World Templates
- Simulate Impersonation and BEC
- AI Determines Employee Risk
Barracuda WAF-as-a-Service
- Application security is complicated to deploy and manage without specialized resources.
- Continuous updates to applications can lead to new vulnerabilities.
- Legacy applications were developed without secure coding practices.
- Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.
- Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.
- Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.
- Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.
- Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.
- Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.
Barracuda Web Application Firewall
Barracuda Web Security Gateway
BIG-IP Local Traffic Manager
Blue Coat Systems Advanced Threat Protection
The Blue Coat Advanced Threat Protection solution integrates technologies from the Blue Coat Security and Policy Enforcement Center and the Resolution Center. It delivers a comprehensive, integrated and modern approach to advanced persistent threats, advanced targeted attacks, advanced malware, unknown malware and zero-day threats through its Advanced Threat Protection Lifecycle Defense.
This defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks.
The Blue Coat Advanced Threat Protection Lifecycle Defense operates in three stages:
Detect and Protect for Ongoing Security Operations: The Blue Coat Secure Web Gateway and Blue Coat Content Analysis System with malware scanning engines, protect in real-time against known threats, malicious sources, and malware delivery networks. Contextual information about new threats is shared locally and globally via the Blue Coat global intelligence network in a continuous feedback loop that extends threat knowledge and protection effectiveness.
Analyze and Mitigate for Incident Containment: Unknown threats are escalated for incident containment using the Blue Coat Content Analysis System and Security Analytics Platform, which both use the Blue Coat Malware Analysis Appliance. As the behaviors and characteristics of unknown or advanced malware and zero-day threats are learned through automated analysis, that intelligence is shared across the security infrastructure, shifting protection to the gateway for a more scalable defense.
Investigate and Remediate for Incident Resolution: The Security Analytics Platform allows security incident escalation for retrospective analysis to enable threat profiling and incident resolution. Intelligence of the now-known threat is used to investigate and remediate the full scope of the attack, including other instances of the threat already on the network. The intelligence on the full scope of the attack is shared locally across the security infrastructure as well as globally across Blue Coat’s 15,000 customers and 75 million users to operationalize the new knowledge and fortify the security infrastructure.
The Blue Coat Advanced Threat Protection solution is designed to integrate into your existing security infrastructure, including your IPS, NGFW, SIEM and malware sandbox solutions, allowing you to deploy a defense-in-depth approach that shares information to increase protection.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.