View

Sorting

Products found: 110

logo
Offer a reference bonus
1.70

APC Aquaflair TRAC-TRAF-TRAH

Air-cooled chillers, free-cooling chillers and heat pumps with scroll compressors and R410A refrigerant. • All-in-one units, completely configurable for easy design and installation, continuous and quiet operations in multiple applications and environmental conditions. • Aquaflair chillers are designed for Tier III and IV data center installations
... Learn more
-
ROI-calculator
Configurator
ROI-
-
3
1
logo
Offer a reference bonus
1.70

APC Back-UPS Pro

The Back-UPS Pro family offers guaranteed power protection for high performance computer systems, routers/modems, external storage devices, game consoles and other electronics in your home or business. These UPSs supply electronics with abundant battery backup during outages and stabilize unsafe voltage levels. They also provide power protection from damaging surges and spikes, and allow the use of management software so you get the most out of your UPS. Premium features of this family may include Automatic Voltage Regulation (AVR), an LCD display, Smart Outlets, energy saving functions that reduce electricity use, network manageability, Watchdog, or configurable outlets. Together with the rest of the Back-UPS Pro's standard features, they are the perfect choice to protect your data and keep your system available.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
16
16
logo
Offer a reference bonus
0.00

APC Smart-UPS VT

10kVA to 40kVA
Smart-UPS® VT offers centralized 3 Phase UPS power protection with the reliability of the award winning Smart-UPS family. Ideal for small data centers, large retail stores, regional offices, and dense power requirements, the Smart-UPS VT includes dual-mains input, automatic and maintenance bypasses, and scalable runtime with hot-swappable batteries for increased availability. The rack mounted version maximizes valuable floor space by incorporating UPS, power distribution, and additional battery capacity in a single rack. Low cost of ownership is achieved through best-in-class efficiency and a reduction in rating of electrical infrastructure - wires, transformers, and generators due the Smart-UPS VT's Soft Start feature. BENEFITS Protection
  • Ensures the product has been tested and approved to work safely with the connected service provider equipment and within the specified environment.
  • Provides temporary battery power when the utility power is out.
  • Gives higher application availability by correcting poor frequency and voltage conditions without using the battery.
Sustainability
  • Ensures that UPSs sold in the EU are highly efficient
Availability
  • Delivers higher availability through redundant batteries.
  • Allows additional run time to be quickly added as needed.
  • Increases availability by allowing the UPS to be connected to two separate power sources.
  • Supplies utility power to the connected loads in the event of a UPS power overload or fault.
  • Ensures clean, uninterrupted power to protected equipment when generator power is used.
Serviceability
  • Enables fast battery replacement, lowering Mean Time to Repair (MTTR).
  • Enables pre-installation UPS staging and testing and faster installation.
  • Periodic battery self-test ensures early detection of a battery that needs to be replaced.
  • Provides fast serviceability and reduced maintenance requirements via self-diagnosing, field-replaceable modules.
Manageability
  • Quickly understand unit and power status with visual indicators.
  • Ensures compatibility with different input frequencies.
  • Provides notification of changing utility power and UPS power conditions
  • Provides remote power management of the UPS over the network.
  • Enables centralized management via the APC InfraStruXure Manager.
  • Alpha-Numeric Display which displays system parameters and alarms.
  • Customize UPS capabilities with management cards.
Total Cost of Ownership
  • Maximizes battery performance, life, and reliability through intelligent, precision charging.
  • Reduces installation costs by eliminating the need for an external mechanical bypass.
  • Prolongs battery life by regulating the charge voltage according to battery temperature.
  • Minimizes installation costs by enabling the use of smaller generators and cabling.
... Learn more
ROI-calculator
Configurator
ROI-
-
3
2
logo
Offer a reference bonus
1.70

APC Symmetra

APC Symmetra is a highly available single phase UPS features redundant and scalable double-conversion on-line power protection. Engineered to deliver the highest level of business continuity possible, Symmetra's modular, redundant architecture can scale power and run time as demand increases or when higher levels of availability are required. Integrated network manageability provides real time status updates of UPS health and environmental conditions. Hot-swappable, user replaceable power, battery, and intelligence modules enables low MTTR and ease of service. Symmetra's modular design provides redundant power in a single chassis for business-critical applications in server rooms and network closets.
... Learn more
ROI-calculator
Configurator
ROI-
-
20
14
logo
Offer a reference bonus
2.00

Aruba Switch

The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.

... Learn more
ROI-calculator
Configurator
ROI-
-
4
10
logo
Offer a reference bonus
1.40

AXIS F

AXIS F Series - Flexible cameras that let you see more Flexible, rugged, discreet design 1-channel and 4-channel main units Choice of indoor, outdoor, standard, varifocal, pinhole, fisheye and dome sensor units Wide Dynamic Range and Axis’ Zipstream technology Two-way audio, input/output ports Local storage, PoE, 8-28 V DC AXIS F Series Discreet cameras for wide application AXIS F Series offers flexible, high-performance HDTV cameras for extremely discreet indoor, outdoor and in-vehicle surveillance applications. They are ideal for ATMs (automated teller machines), banks, stores, hotels, as well as rugged environments such as emergency vehicles, buses, trams and trucks. Divided concept AXIS F Series is based on a divided network camera concept, where the camera is split into a sensor unit—made up of a lens and image sensor with a cable—and a main unit, which is the body of a camera. The divided concept enables flexibility in the choice of hardware, as well as in the installation. The small sensor unit can be installed discreetly in tight places, while the long cable from the sensor unit to the main unit provides the flexibility to place the main unit where there is space. The main or sensor unit can be easily relocated or changed after the initial installation, giving users additional flexibility.  Wide selection AXIS F Series comprises one-channel AXIS F41 Main Unit, four-channel AXIS F34 and AXIS F44 Main Units, and AXIS F Sensor Units with different lens types, form factors and price points. The series also includes AXIS F34 Surveillance System, a complete hardware and software solution aimed at small stores and offices. With the exception of AXIS F34 Surveillance System, AXIS F main units and sensor units are sold separately to give customers the ability to put together the hardware features that best suit the application. Build your own camera system Click on the numbers at right to read more about the different components. Main unit The main unit houses the processor, network, power and other connections. It determines, among other things, the video streaming performance, the image settings available (such as wide dynamic range), and analytics. One-channel and four-channel main units are available. When there are up to four closely situated surveillance areas to be covered, the four-channel main units are cost-effective solutions as they can stream videos from four sensor units simultaneously.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
10
13
logo
Offer a reference bonus
0.00

AXIS M1135

AXIS M1135 — это доступная по цене, компактная сетевая камера, позволяющая получать видео превосходного качества с разрешением 2 Мп. Она предназначена для открытого видеонаблюдения и, в качестве сдерживающего фактора, помогает предотвращать несанкционированное проникновение, антиобщественные действия и другие правонарушения. Отличаясь универсальностью и экономичностью в установке, эта модель идеально подходит для охранного видеонаблюдения на различных промышленных и коммерческих объектах, таких как магазины розничной торговли, крытые рынки и зоны погрузки-разгрузки.

Эта недорогая камера линейки M от компании Axis оснащена встроенным микрофоном и функцией записи звука, что позволяет прослушивать и записывать звук в пределах некоторой фиксированной области. Камера также оснащена индикатором потокового видео, с помощью которого можно легко определить, что камера ведет съемку и передает изображение.

Особенности модели:
Универсальная компактная конструкция
Технологии Lightfinder и Forensic WDR
Встроенный микрофон для записи звука
Сменные объективы (крепление CS)
Zipstream с поддержкой форматов H.264 и H.265
Характеристики:
Тип камеры - Фиксированная
Видеоразрешение - 2Мп
Варифокальный объектив - есть
Цифровое увеличение  - есть
Круглосуточное видеонаблюдение - есть
Протокол сжатия данных - Н.264, Н.265
Встроенная видеоаналитика  - нет
Уличная установка - нет
Питание по PoE - есть
Внутренняя карта памяти    - есть
Поддержка Wi-Fi    - нет
Встроенный микрофон - есть
Поддержка аудио     - есть
Встроенные средства кибербезопасности - есть
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Azure Data Warehouse

Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.

Get rid of worries


Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.

... Learn more
ROI-calculator
Configurator
ROI-
-
19
2
logo
Offer a reference bonus
2.00

Azure Resiliency

Business continuity with data resiliency Build applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global network. Build redundancies at the virtual machine (VM), datacenter, and regional levels based on your business needs. And stay compliant with your country’s or region’s legal and regulatory requirements respective of the location of your data. Achieve High Availability faster in the cloud As soon as you sign up, access the tools, the infrastructure, and the guidance you need to deploy your applications in the cloud. Support your most demanding mission-critical applications to build always-available sites cost-effectively. And take advantage of an SLA of up to 99.99 percent for your virtual machines. High-availability solutions
  • Availability Zones
  • Availability sets
  • Virtual Machine Scale Sets (VMSS)
Easy disaster recovery and backup Azure Site Recovery, combined with geo-redundant storage, is natively available for disaster recovery. Protect against bad code, data corruption, and accidental deletion with cost-effective backup. Stay compliant with long retention times, maintain reliability through geo-replicated storage, and simplify your processes with automation. Keep your applications up and running Hear from one of our customers about their resiliency experience building on Azure. Plus, our product team talks about our commitment to delivering a service that meets the needs of your resiliency strategy. Availability Zones is a high-availability offering that protects your applications and data from datacenter failures. Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions. The physical separation of Availability Zones within a region protects applications and data from datacenter failures. Zone-redundant services replicate your applications and data across Availability Zones to protect from single-points-of-failure. With Availability Zones, Azure offers industry best 99.99% VM uptime SLA.
... Learn more
ROI-calculator
Configurator
ROI-
-
9
12
logo
Offer a reference bonus
2.00

Azure Virtual Machines

Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling. 
Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.

... Learn more
ROI-calculator
Configurator
ROI-
-
5
12
logo
Offer a reference bonus
2.00

Fortinet FortiCASB

Organizations are increasingly adopting Infrastructure-as-a-Service (IaaS) and Security-as-a-Service (SaaS) services and applications for the agility and savings they offer, but find that they don't have the visibility and control they require. FortiCASB-SaaS is a cloud-native Cloud Access Security Broker (CASB) subscription service that is designed to provide visibility, compliance, data security, and threat protection for cloud-based services being used by an organization. With support for all major IaaS providers and most major SaaS service providers, FortiCASB provides insights into resources, users, behaviors, and data stored in the cloud with comprehensive reporting tools. It also includes advanced controls to extend security policies from within the network perimeter to IaaS resources and SaaS applications. Features and Benefits: API-Based. Direct access to data stored in the cloud for on-network and remote protection. Compliance and DLP. Customizable data loss prevention tools and predefined compliance reporting options. User Insights and Policies. Usage, entitlement, and configuration assessments provide visibility and control for cloud applications. Security Fabric Integration. AV and Sandbox integration scans stored data and protects from the latest threats. Shadow IT Discovery. Consolidated reporting for FortiGate and FortiAnalyzer to detect on-network SaaS usage. Advanced Analytics. Comprehensive and easy-to-use visual tools quickly identify risks and policy violations.
... Learn more
ROI-calculator
Configurator
ROI-
-
9
9
logo
Offer a reference bonus
0.00

FortiNet FortiClient

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises’ security posture. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules: Fabric Agent for security Fabric connectivity, the endpoint security modules, and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control, and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. Features and Benefits: Broad endpoint visibility FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more. Endpoint compliance and vulnerability management Reduce the endpoint attack surface and manage endpoint-borne risk. Vulnerability scanning with flexible patching options. Detect and enforce endpoint compliance. Proactive endpoint defense Anti-exploit, sandbox integration, and behavior and pattern-based malware detection proactively detect and block malware, malicious scripts, document-based, and other advanced attacks. Automated threat containment Integration with the Security Fabric enables automated response. Mitigate unpatched vulnerabilities, alert users, and quarantine risky or compromised endpoints to stem an outbreak. Secure remote access Reliable, simple, and secure remote access with built-in, always-on VPN, with the added security of two-factor authentication, plus single-sign-on capabilities. Easy to deploy and manage Easy to deploy and manage Modular and light-weight endpoint agents are centrally managed with the Enterprise Manager Server (EMS). Fabric Agent is compatible with Fabric-Ready endpoint security solutions.
... Learn more
ROI-calculator
Configurator
ROI-
-
11
12
logo
Offer a reference bonus
2.00

Fortinet FortiGate NGFW

FortiGate NGFWs are network firewalls powered by purpose-built security processing units (SPUs) including the latest NP7 (Network Processor 7). They enable security-driven networking, and are ideal network firewalls for hybrid and hyperscale data centers. Fortinet NGFWs reduce cost and complexity by eliminating points products and consolidating industry-leading security capabilities such as secure sockets layer (SSL) inspection including the latest TLS1.3, web filtering, intrusion prevention system (IPS) to provide fully visibility and protect any edge. Fortinet NGFWs uniquely meet the performance needs of hyperscale and hybrid IT architectures, enabling organizations to deliver optimal user experience, and manage security risks for better business continuity. FortiGate next-generation firewalls inspect traffic at hyperscale as it enters and leaves the network. These inspections happen at unparalleled speed, scale, and performance to ensure that only legitimate traffic is allowed, all without degrading user experience or creating costly downtime. As an integral part of the Fortinet Security Fabric, FortiGate NGFWs can communicate within the comprehensive Fortinet security portfolio as well as third-party security solutions in a multivendor environment. FortiGate NGFWs seamlessly integrate with artificial intelligence (AI)-driven FortiGuard and FortiSandbox services to protect against known and zero-day threats and improve operational efficiency through integration with Fabric Management Center.
... Learn more
ROI-calculator
Configurator
ROI-
-
19
12
logo
Offer a reference bonus
2.00

Fortinet FortiGate SD-WAN

As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures. SD-WAN offers business application steering, cost savings, and performance for Software-as-a-Service (SaaS) applications, as well as unified communication services. However, SD-WAN has its own shortcomings—especially when it comes to security with direct internet access. Fortinet FortiGate Secure SD-WAN includes best-of-breed next-generation firewall (NGFW) security, SD-WAN, advanced routing, and WAN optimization capabilities, delivering a security-driven networking WAN edge transformation in a unified offering. Fortinet has received a “Recommended” rating in the first ever test conducted by NSS Labs for Software-Defined Wide Area Networking. Fortinet was ranked highly for delivering excellent quality of experience for voice and video, high overlay VPN throughput, and best price/performance. FortiGate Secure SD-WAN Product Details:
  • Best WAN Edge Price/Performance
  • WAN Path Controller with Remediation
  • Fastest Application Identification and Steering
  • Advance Routing Capabilities and WAN Optimization
... Learn more
ROI-calculator
Configurator
ROI-
-
20
9
logo
Offer a reference bonus
2.00

Fortinet FortiMail Secure Email Gateway

Email security remains a key productivity tool for today's organizations, as well as a successful attack vector for cyber criminals.  According to the Verizon 2018 Data Breach Investigations Report, 49% of malware was installed via malicious email.  Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used." FortiMail Email security utilizes the latest technologies and security services from FortiGuard Labs to deliver consistently top-rated protection from common and advanced threats while integrating robust data protection capabilities to avoid data loss. FortiMail Product Details Organizations typically select FortiMail email security to shield users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Features and Benefits
  • Top-rated Antispam and Antiphishing: Maintain productivity by shielding end users from unwanted spam and malicious phishing attacks
  • Independently certified advanced threat defense: Thwart cyber criminals intent on stealing data, holding systems for ransomware, conducting fraud, and other malicious purposes
  • Integrated data protection: Maintain the privacy of personal information and confidentiality of sensitive data in compliance with regulatory and corporate guidelines
  • Enterprise-class management: Free staff and end users to drive the business by reducing the time spent on email administration 
  • High-performance mail handling: Speed the delivery of legitimate email at an affordable cost
... Learn more
ROI-calculator
Configurator
ROI-
-
14
16
logo
Offer a reference bonus
0.00

FortiNet FortiNAC

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. FortiNAC Product Details: The IoT revolution has raised a new challenge for network owners. How can you see and protect against a myriad of devices showing up on the network? Network Access Control has come back to the forefront of security solutions to address that challenge. This technology was deployed to assist with bring-your-own-device (BYOD) policies and is now getting renewed focus as a means to safely accommodate headless IoT devices in the network. FortiNAC enables three key capabilities to secure IoT devices:
  • Network visibility to see every device and user as they join the network
  • Network control to limit where devices can go on the network
  • Automated response to speed the reaction time to events from days to seconds
Collectively, these three capabilities provide the tools that network owners need to secure a world that is embracing IoT. The FortNAC solution protects both wireless and wired networks with a centralized architecture that enables distributed deployments with automated responsiveness. FortiNAC Models and Specifications The FortiNAC product line includes hardware appliances, virtual machines and licenses.  The licenses can run on either the hardware appliance or the virtual machine.  Each FortiNAC deployment requires both a Control and Application server.  Note that if your deployment is larger than what a single server can support, you can stack servers for more capacity.  The FortiNAC solution has no upper limit on the number of concurrent ports it can support. You can find more details here.
... Learn more
ROI-calculator
Configurator
ROI-
-
9
0
logo
Offer a reference bonus
2.00

Fortinet FortiSandbox

With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats. While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation. Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution. Features and Benefits: Independently top-rated. NSS Labs "Recommended" for breach detection and breach prevention, and ICSA labs certified for advanced threat defense. Broad integration. Extends advanced threat protection to your next-generation firewall, web application firewall, secure email gateway, and endpoint protection platform. Intelligent automation. Speeds mitigation by sharing real-time updates to disrupt threats at the origin and subsequent immunization across the entire organization and the global community. All-in-one. Simplifies deployment and reduces complexity by covering all protocols in a single common sandbox platform. Flexible deployment. Available as a physical or virtual appliance on premises, as well as a cloud-based or managed service. Open extensibility. Flexible APIs for easy third-party integration and available day-zero integration with Fabric-Ready partners.
... Learn more
ROI-calculator
Configurator
ROI-
-
4
14
logo
Offer a reference bonus
2.00

Fortinet FortiWeb: Web Application Firewall (WAF)

FortiWeb Product Details Whether to simply meet compliance standards or to protect mission-critical hosted applications, FortiWeb's web application firewalls provide advanced features that defend web applications from known and zero-day threats. Using an advanced multi-layered and correlated approach, FortiWeb provides complete security for your external and internal web-based applications from the OWASP Top 10 and many other threats. At the heart of FortiWeb are its dual-layer AI-based detection engines that intelligently detect threats with nearly no false positive detections. Features and Benefits
  • Proven Web Application Protection. FortiWeb protects against all the OWASP Top-10 threats, DDoS attacks and many others to defend your mission critical web-based applications
  • AI-based Threat Detection. In addition to regular signature updates and many other layers of defenses, FortiWeb’s AI-based, dual-layer machine learning engines protect against zero-day attacks
  • Security Fabric Integration. Integration with FortiGate firewalls and FortiSandbox deliver protection from advanced persistent threats
  • Advanced Visual Analytics. FortiWeb’s visual reporting tools provide detailed analyses of attack sources, types and other elements that provide insights not available with other WAF solutions 
  • False Positive Mitigation Tools. Advanced tools that minimize the day-to-day management of policies and exception lists to ensure only unwanted traffic is blocked
  • Hardware-based Acceleration. FortiWeb delivers industry-leading protected WAF throughputs and blazing fast secure traffic encryption/decryption
... Learn more
ROI-calculator
Configurator
ROI-
-
12
7
logo
Offer a reference bonus
2.00

FortiSIEM

FortiSIEM Delivers Next-Generation SIEM Capabilities

FortiSIEM brings together visibility, correlation, automated response, and remediation in a single, scalable solution. It reduces the complexity of managing network and security operations to effectively free resources, improve breach detection, and even prevent breaches. Product's architecture enables unified data collection and analytics from diverse information sources including logs, performance metrics, security alerts, and configuration changes. FortiSIEM combines the analytics traditionally monitored in separate silos of the security operations center (SOC) and network operations center (NOC) for a more holistic view of the security and availability of the business. In addition, FortiSIEM UEBA leverages machine learning and statistical methodologies to baseline normal behavior and incorporate real-time, actionable insights into anomalous user behavior regarding business-critical data. By combining telemetry that is pulled from endpoint sensors, network device flows, server and applications logs, and cloud APIs, FortiSIEM is able to build comprehensive profiles of users, peer groups, endpoints, applications, files, and networks.  FortiSIEM UEBA behavioral anomaly detection is a low-overhead but high-fidelity way to gain visibility of end-to-end activity, from endpoints, to on-premises servers and network activity, to cloud applications.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.00

Hewlett Packard Enterprise StoreOnce

HPE StoreOnce Systems with StoreOnce Catalyst provide a single, high-performance backup architecture that spans the entire enterprise. You can reduce the amount of backup data you need to store by 95% and choose between powerful dedicated appliances for larger offices and data centers, and flexible virtual appliances for smaller and remote offices. Industry leading backup and restore speeds mean that you can meet shrinking backup windows and recovery SLAs. StoreOnce Catalyst prevents exposure of backup copies to ransomware.

With StoreOnce you can dedupe anywhere and control the movement of deduplicated data across the enterprise using your backup application. Using Cloud Bank Storage to cloud-enable your current backup and business applications, StoreOnce Systems provide even more flexibility to reduce your cost, risk and complexity.

Features:

  • New StoreOnce single node systems based on Gen10 ProLiant technology. New more scalable and flexible VSA structure. New flex I/O choices with 10/25GbE-SFP and 32Gb Fibre Channel.
  • New StoreOnce products move to an all-inclusive licensing structure. StoreOnce Catalyst and replication are included with the product at no additional charge (Encryption license at a nominal charge).
  • New and improved GUI, like other HPE Storage products. Including Federated Management to allow customers to configure and monitor multiple Gen4 StoreOnce systems or VSAs in a single pane of glass.
  • Role Based Access Control (RBAC) which allows customers to assign different roles/permissions to users of their StoreOnce system.
  • Support for HPE RMC direct data path in the new StoreOnce Gen4 systems, backup data is moved directly from 3PAR to StoreOnce without having to go through the RMC VM.
  • Addition of Commvault support for Catalyst/Catalyst Copy to enable deeper integration with StoreOnce.

HPE StoreOnce delivers a unified solution for seamless data movement across the enterprise; with cost-effective virtual backup machines ideal for smaller remote offices, high-performance dedicated appliances for larger sites, and highly scalable, powerful systems for your data center.

... Learn more
ROI-calculator
Configurator
ROI-
-
15
12

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.