View

Sorting

Products found: 33

logo
Offer a reference bonus
0.00

Arbit Data Diode

The Arbit Data Diode moves data from an insecure network to a secure network ensuring that no data is able to flow back. This is handles by the physical principle of the data diode. The Arbit Data Diode is a physical data diode that eliminates the threat of remote data stealing by establishing a physically secure one-way connection with a single fiber-optic cable. The transmission is handled by two dedicated servers. The sending server is called a pitcher and the receiving server is called a catcher. No data can be transported from the receiving network to the transmitting network. Therefore, the Arbit Data Diode is just as safe as manual data transfer, but offers the same convenience as a normal network connection.

The Arbit Data Diode has the following features:
  • More hardware configurations available
  • Maximum file size limited only by available disk space
  • Based on gigabit network interfaces
  • Transports all file types and emails with full transaction control
  • Unlimited number of data channels
  • Data channel priority (on transaction basis)
  • Supports up to 24 streaming channels (video, radio, etc.)
  • Back Pressure in case of critical diskspace
  • Safe points in case of increased data flow
  • Notifications by email: Required retransmissions, Daily operational statistics, Total count and size of transactions within last 24h.
  • Operated by web-interfaces
  • No daily maintenance
  • Software based on hardened Linux
  • Support Supervisory Control and Data Acquisition (SCADA) networks
  • Support Industrial Control Systems (ICS)

SUPPORTED PROTOCOLS
  • Mail (SMTP)
  • Simple file transfer (FTP, SFTP)
  • Windows share mapping (SMB)
  • Time synchronization (NTP)
  • HTTP/HTTPS forwarding
  • Streaming (UDP/TCP) 
... Learn more
-
-
ROI-
-
0
0
logo
Offer a reference bonus
1.00

Arbor APS

• DDoS protection from active botnets • DDoS protection from active DDoS campaigns based on IP reputation • Advanced web crawler service • GeoIP tracking • Domain and IP reputation to block threats APS enhances your overall protection by using Cloud Signaling™ to connect local protection with cloud-based DDoS services. With Cloud Signaling, APS automatically alerts upstream service providers, such as your ISP or Arbor CloudSM, when larger attacks threaten availability. This allows for a faster time to mitigate attacks. 
... Learn more
-
-
ROI-
-
0
0
logo
Offer a reference bonus
1.70

BIG-IP Local Traffic Manager

BIG-IP Local Traffic Manager (LTM) gives you a depth of understanding about your network’s application traffic and control over how it’s handled. It transforms the chaotic volume of network traffic into logically assembled streams of data, and then makes intelligent traffic management decisions, selecting the right destination based on server performance, security, and availability. Yes, BIG-IP LTM enables sophisticated load balancing. But, that’s just the beginning. Full proxy means full power. If you can see it, you can manipulate it. Because BIG-IP LTM is a full proxy, you can inspect, manage, and report on application traffic entering and exiting your network. From basic load balancing to complex traffic management decisions based on client, server, or application status, BIG-IP LTM gives you granular control over app traffic. For example, if you want to direct traffic based on the requested URL or log specific server responses to a reporting system, BIG-IP LTM has the architecture and the tools you need to do it. Operational efficiency? Check. BIG-IP LTM can optimize the speed and reliability of your applications via both network and application layers. Using real-time protocol and traffic management decisions based on application and server conditions, extensive connection management, and TCP and content offloading, BIG-IP LTM dramatically improves page load times and the user experience. Whether it’s negotiating high-latency networks or offloading millions of connections, BIG-IP LTM can improve the performance of your infrastructure and your applications. The SSL performance of BIG-IP LTM lets you cost-effectively protect the end-to-end user experience by encrypting everything from the client to the server. It also scales on-demand and absorbs potentially crippling DDoS attacks. Often SSL is turned on throughout the network. Thing is, most network security devices aren’t built to detect malicious traffic in layers 4–7. Separating the good and bad traffic is the first problem, taking action on the malicious traffic is the second. BIG-IP LTM includes levels of inspection necessary to block bad traffic and allow good traffic to pass through.
... Learn more
ROI-
-
7
7
logo
Offer a reference bonus
0.00

Calyptix AccessEnforcer UTM Firewall

The Simple Way to Protect Networks AccessEnforcer is an all-in-one solution for network security and management. Our UTM Firewall blocks threats like hackers, spam, and malware automatically. Network tools keep your connections fast and reliable. Our network firewall saves you time and money because it is easy to set up and manage. Every model has the same dashboard and features, so you simply pick the best size for your network. Why AccessEnforcer? Every Feature Included AccessEnforcer has one level of licensing: all inclusive. You get every feature for one price. You do not have to pay more for web filtering or intrusion prevention. You do not have to manage multiple licenses. AccessEnforcer includes everything. Unlimited Users You do not have to pay more to add users to a network with AccessEnforcer. You can have one user, 10, or 100 – and you always pay the same price. Our models vary by the number of connections they can comfortably support at one time. Just pick the right size device and have as many users as you wish. Unbeatable Support Our customers and partners routinely tell us Calyptix tech support is the best in the industry. Why? Because we have US-based engineers who answer the phone and solve your problem. Automatic Updates Unlike some of our competitors, our solution updates every day automatically. The latest tactics for hacking, malware, and spam are blocked hands-free, so your network stays secure. Features:
  • UTM Firewall. A managed firewall with deep packet inspection that blocks threats to your network before they can cause harm. Prevent scans, spoofing, SYN floods, DDoS attacks, fragmentation attacks, and more automatically.
  • GUI-Based Management. Graphic interface that allows technicians to configure and monitor the network with clicks instead of code. Check network alerts, change settings, or set a DMZ with a single click.
  • VPN Unlimited. Two VPN services provide fast and secure connections to your remote network. Create an unlimited number of VPN clients and policies, and let users connect with Android, iOS, OS X, and Windows devices.
  • Web Filtering. Monitors and controls web browsing for any and all users on the network. Set policies to allow or deny specific types of content and filter by topic, keyword, extension, and file type. Customize the block page and set policies to apply only at certain times. Activate the HTTPS filter with a single click.
  • Email Filtering. Scans incoming emails with multiple anti-virus and anti-spam engines and checks them against real-time DNS blacklists. Filter email by geography, keyword, and global whitelist and blacklist, and allow users to manage individual spam folders. Supports SMTP and easy integration with Microsoft Exchange.
  • Intrusion Detection & Prevention. Examines the contents of every packet for malicious content with IDS/IPS before it enters the network. Set to block or log potential threats, and ban malicious hosts automatically with dynamic blacklisting mode.
  • Quality of Service (QoS). Ensure VoIP phones and other critical systems are not robbed of network bandwidth by non-essential traffic. Allocate or limit bandwidth for any source or destination, and allow systems to “borrow” spare bandwidth when available.
... Learn more
-
-
ROI-
-
15
6
logo
Offer a reference bonus
2.00

Check Point 21000 Appliances

Delivers the best performance in its class Up to 44.5 Gbps of real-world firewall throughput Up to 6.9 Gbps of real-world IPS throughput Supports sub 5 micro-second low-latency transactions Supports high availability and serviceability Offers a variety of network options to work in any network environment Offers Lights-Out-Management option for remote out-of-band management Enables service without downtime thanks to hot-swap and redundant components Reduces costs through security consolidation Extends easily to add more security features without adding a new appliance Available in four complete and Software Blade packages that meet any security need Available in a low-cost, high-performance package with extended memory for maximum connection capacity Features Maximum security and performance The Check Point 21000 Appliances offer maximum availability of business-critical applications and the best performance available in their class. High port density with up to 37x1GbE ports for network segmentation 110 Gbps firewall throughput and sub-5µs latency for mission-critical applications Comes in compact 2-rack unit chassis Comes with acceleration and clustering technologies Reliability and high serviceability Meet the uncompromising high availability standards of modern data centers; the 21000 Appliances are designed to be highly serviceable, even when deployed in customer networks. Hot-swappable redundant power supplies, hard disk drives and fans An advanced Lights-Out-Management card provides out-of-band remote management to remotely diagnose, start, restart and manage the appliance from a remote location Prevent unknown threats Check Point provides complete zero-day threat prevention and alerts when under attack. Threat Extraction delivers zero-malware documents in zero seconds. Threat Emulation inspects files for malicious content in a virtual sandbox. When Threat Emulation discovers new threats, a signature is sent to the Check Point ThreatCloud database which documents and shares information on the newly identified malware with other Check Point customers — providing immediate protection against zero-day threats. Security acceleration module for greater performance confidence With the optional Security Acceleration Module, you can confidently increase firewall and VPN bandwidth through your 21000 Appliance without performance degradation. Check Point’s innovative, purpose-built SecurityCore™ technology uses parallel and security processing power to accelerate security performance. Offloads security processing from the general purpose appliance CPU Available as a bundle for significant savings right out of the box High network capacity Deploy the Check Point 21000 Appliances in any network environment. Up to 37 10/100/1000Base-T ports Up to 36 1000base-F SFP, or up to 13 10GBase-F SFP+ ports Three front-facing expansion slots Up to 1,024 VLANs for higher network segmentation Pre-configured with Next Generation Software Blade packages Pre-configured with Next Generation Software Blade packages The Check Point 21000 Appliances offer a complete and consolidated security solution available in five Next Generation Security Software Blade packages. Next Generation Firewall—identify and control applications by user and scan content to stop threats (included Blades: IPS and Application Control) Next Generation Secure Web Gateway—enable secure use of Web 2.0 with real-time multilayer protection against web-borne malware (included Blades: Application Control, URL Filtering, Antivirus and SmartEvent) Next Generation Data Protection—preemptively protect sensitive information from unintentional loss, educate users on proper data-handling policies and empower them to remediate incidents in real-time (included Blades: IPS, Application Control and Data-Loss Prevention). Next Generation Threat Prevention—apply multiple layers of protection to prevent sophisticated cyber-threats (included Blades: IPS, Application Control, Antivirus, Anti-Bot, URL Filtering and Email Security) Next Generation Threat Extraction—(NGTX): advanced next-gen zero-day threat prevention, NGTP with Threat Emulation and Threat Extraction. Additional Software Blade upgrades are available to further extend and customize protection options
... Learn more
ROI-
-
7
3
logo
Offer a reference bonus
2.00

Check Point 600 Appliance

 Benefits Secures your small business with advanced security Protects against viruses, spam, dangerous applications and malicious websites Designed from the ground up for the needs of small businesses Connects securely to your office network from any laptop, smartphone or tablet Sets up in minutes with easy and intuitive web-based management Simplifies your security management with optional Check Point SMB Managed Security Services Keeps you connected with flexibility, speed and power Supports multiple Internet access options, including Ethernet, ADSL, 3G and 4G Provides integrated wireless security with guest access Delivers market-leading speeds with 100 Mbps of real-world throughput Features Enterprise-caliber firewall and threat protection Small companies shouldn’t have to settle for less security. The Check Point 600 Appliance has the industry’s highest-ranked next-generation firewall, IPS and threat prevention security technologies to deliver robust protection from modern cyber-threats. You’ll get the same level of protection enjoyed by Fortune 100 companies—at SMB prices. A comprehensive protection suite Leveraging the proven and flexible Software Blade Architecture, the 600 Appliance delivers multilayer security to the small-office environment, including: Firewall VPN Advanced Networking & Clustering Identity Awareness & User Awareness IPS Application Control URL Filtering Antivirus Anti-Bot Anti-Spam and Email Security Security managed via the cloud We can even help you manage your security appliance through the cloud. With Check Point Cloud-Managed Security Service, you’ll leverage Check Point’s technology leadership and 24/7 security expertise to ensure your network will be monitored and protected at all times. Learn more about the features and benefits of this service on our Check Point SMB Cloud-Managed Security Service page. Flexible network connections with high capacity The 600 Appliance comes standard with 10 x 1Gbps Ethernet ports. For added flexibility and convenience, Check Point offers a wireless version that includes a WiFi access point (802.11b/g/n) that supports WEP, WPA and WPA2 authentication, as well as secured guest access capabilities. Integrated ADSL modem Included USB and PCI Express card slots make it easy to create a redundant Internet link for maximum reliability Simple management, configuration and deployment The Check Point 600 Appliance can be up and ready in minutes, offering hassle-free deployment to small offices with minimal IT support staff. Simple web-based local management interface First-time set-up wizard Easy-to-understand logs and reports for hassle-free device monitoring
... Learn more
ROI-
-
4
15
logo
Offer a reference bonus
2.40

Check Point Intrusion Prevention System Software Blade

The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. The IPS Software Blade delivers complete and proactive intrusion prevention – all with the deployment and management advantages of a unified and extensible next-generation firewall solution. Benefits
  • Next-generation security prevention, protection and performance
  • Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
  • Check Point is ranked #1 in Microsoft and Adobe threat coverage
  • Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
  • Unrivaled, multi-Gigabit performance in an integrated IPS
  • Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
  • Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
  • CoreXL technology provides the most efficient and high-performance use of multi-core technologies
  • Lowest TCO and fastest ROI of any enterprise-class firewall solution
  • One-click activation of IPS and firewall protection on any Check Point gateway
  • Delivers unmatched extensibility and flexibility—all without adding CapEx
  • Integrated into Check Point Software Blade Architecture for on-demand security
The Check Point IPS Software Blade is delivering better security than our previous IPS software solution and at a lower cost. Check Point has designed the IPS software blade for efficient resource utilization, which improves performance, mission critical availability, and uptime. Complete Intrusion Prevention System (IPS) Functionality The Intrusion Protection System Software Blade complements firewall protection, further securing your network without degrading gateway performance. Full-featured IPS The IPS Software Blade provides a complete Intrusion Prevention System security solution, providing comprehensive network protection against malicious and unwanted network traffic, including:
  • Malware attacks
  • Dos and DDoS attacks
  • Application and server vulnerabilities
  • Insider threats
  • Unwanted application traffic, including IM and P2P
  • Geo-protections
Geo-protections enforce or monitor traffic based on the source or destination country. Create a geo-protection policy with exceptions to allow legitimate traffic through while blocking or monitoring traffic from unknown and untrusted sources. Monitor activity with the SmartEvent Software Blade. Trusted Security Real-Time protections – The IPS Software Blade is constantly updated with new defenses against emerging threats. Many of the IPS protections are pre-emptive, providing defenses before vulnerabilities are discovered or exploits are even created. Microsoft vulnerability coverage – Check Point is ranked #1 in Microsoft threat coverage, including preemptive protections against emerging vulnerabilities and exploits. Multi-gigabit Integrated IPS Performance Delivers up to 15 Gbps of IPS throughput with the default IPS profile. The IPS Software Blade incorporates a high-speed pattern matching engine that does multi-layered, 2-tier inspection for maximum performance with thousands of protections enabled. Dynamic Threat Management With the IPS Software Blade and the SmartEvent Software Blade you gain a new, dynamic management paradigm for today’s high volume, real-time and evolving threat environment. Check Point threat management workflows allow you to handle constant change quickly and efficiently, reducing your management overhead and allowing you to confidently and promptly deploy protections. The IPS Software Blade offers:
  • New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.
  • Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.
  • Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.
  • Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.
  • Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.
  • Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.
  • Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.
... Learn more
ROI-
-
20
2
logo
Offer a reference bonus
2.00

Check Point vSEC Virtual Edition

Secure virtual environments Multi-layered security protections for virtual environments including next-generation firewall and advanced threat prevention Inspect all traffic—from inter-VM to perimeter—in the virtual network Permit secure access to remote systems and networks Unified management of virtual and physical environments Consistent security policy and uniform security management across both physical and virtual infrastructures Visibility into virtualization configuration and security changes Separation of duties between virtualization and security teams Licensing is based on virtual cores used and supports dynamic allocation ideal for elastic workloads Thanks to Check Point vSEC Virtual Edition (VE), we have a virtual security solution that fully integrates into our dynamic virtualized environment with all the performance, security and functionality we’ve expected from our physical Check Point gateways for years. Features Full protections with Check Point Software Blades Check Point vSEC Virtual Edition provides the full protections of the Check Point Software Blade architecture. Firewall, IPS, Antivirus, Anti-Bot Software Blades protect services in the public cloud from unauthorized access and attacks. Application Control Software Blade helps prevent application layer denial of service attacks and protects your cloud services. IPsec VPN Software Blade allows secure communication into cloud resources. Mobile Access Software Blade allows mobile users to connect to the cloud using an SSL encrypted connection with two factor authentication and device pairing. Data Loss Prevention Software Blade protects sensitive data from theft or unintentional loss. SandBlast Zero-Day Protection Blades provide the most comprehensive protection against malware and zero-day attacks. Consolidated logs and reporting for hybrid cloud environments Get visibility and enforcement across your virtual infrastructures using the Next Generation SmartEvent Software Blade. Simplify compliance and audits with unified logs and reporting. Centralized management for virtual and physical infrastructures Manage vSEC VE using your existing on-premise Check Point Unified Security Management Solution. Enforce a consistent security policy for corporate assets across both virtual and physical infrastructures from a single console.
... Learn more
ROI-
-
1
18
logo
Offer a reference bonus
0.00

Crypthomathic Authenticator

Financial institutions and other worldwide on-line service providers have embraced multiple interface channels, such as internet and mobile banking, for business, corporate and retail use, allowing them to reduce costs and  better  service  their  customers.  However,  attacks  on  banking  web-sites have proliferated, and are now an established criminal technique. These  attacks  include  phishing,  pharming,  PC  trojans  and  man-in-the-middle. Improved customer authentication has been widely accepted as a necessary investment in order to prevent these attacks and preserve customer trust.
Strong authentication provides a long-term, strategic solution for protecting against online attacks, such Phishing, Trojans, etc. Digital authentication is about putting measures in place to confirm an individual is who they say they are, so that only the right individual has access to certain information. Strong Customer Authentication systems should be flexible to easily allow different authentication mechanisms to be used depending on the protection profile of users or changes to the security landscape. Cryptomathic delivers the complete solution or individual components for implementing large-scale strong authentication services. The Cryptomathic Authenticator is a Multi-Factor Authentication server designed for scalable applications, such as eBanking and eGovernment, with complete support for a wide range of tokens to seamlessly match the current and future security needs of all user segments.

Multi-Factor Authentication

  •     CAP / DPA
  •     VISA CodeSure
  •     Digital signatures
  •     Matrix cards
  •     OATH (HOTP / TOTP / OCRA)
  •     OTP proprietary tokens (e.g. Vasco)
  •     Pattern recognition
  •     PKI
  •     Secure fax
  •     Smart phone applications (e.g. Cryptomathic)
  •     SMS OTP
  •     Static & partial user name and password

Authentication End-to-end Security

The Authenticator provides a much more secure and comprehensive solution than any other authentication systems - addressing a variety of issues such as audit, compliance and dual control. Here are some of the features:

  •     HSMs (Hardware Security Modules), securing cryptographic keys and authentication data
  •     Attack detection, e.g. invalid authentication attempts
  •     Administrator Security - remote admin client, chip
  •     Card log-on, separation of duties and dual controls
  •     Tamper evident audit logs, including usage log and security log
  •     Database, e.g. HSM encryption

Flexible & Future Proof

Criminals try to defraud users and steal their identities and in various simple and sophisticated ways. The Authenticator addresses relevant attacks and we will continue to add best in class authentication methods over time that foil future attacks ensuring that our customers stay ahead of the criminals. Current major attacks include:

  •     Internal Attack
  •     Man-In-The-Browser
  •     Man-In-The-Middle
  •     Mining
  •     Pharming
  •     Phishing
  •     Social Engineering
  •     Trojan

Authentication Scalability

The Authenticator is scalable and is used by customers for managing anywhere from a few thousand users to several million.

The solution is the best 2FA solution for large roll-outs due to its performance and scalability features:

  •     Fail-over, e.g. back-up or disaster recovery
  •     Clustering
  •     Load balancing across servers and HSMs

Authenticator Return on Investment

Support for multiple authentication mechanisms allow companies to achieve full flexibility in adapting and modifying token strategies while avoiding token vendor lock-in.

This ensures the highest ROI of all authentication servers as our customers can shop around for the most cost efficient authentication method.


... Learn more
-
-
ROI-
-
15
9
logo
Offer a reference bonus
0.00

Data Capture Unit (DCU)

Industrial data diode designed to deliver the highest level of security to OT networks like industrial control systems (ICS) and safety critical infrastructure via physical isolation when there’s a need to connect them to a lower security network (IT Networks or Internet) for replication or analytics.

 

The DCU is designed and manufactured in Germany, its chip design forces data to flow one-way only using a unique electromagnetic induction design, to collect data and guarantee that there’s no physical path for remote access to the OT Network.

 

The DCU has a software complement called, OWG (One-way gateway) software, its two agents, a OWG sender capable of data collection of several protocols (FTP, OPC UA, Syslog), filtering and aggregating data in the OT network (Edge) to then push it thru the DCU and a OWG receiver, which receives data from the DCU and can be configured to send it directly to the cloud (AWS or MindSphere) or to another computer in the IT network.

 

The DCU and OWG are vendor neutral and support Windows or Linux systems.

... Learn more
-
ROI-
-
5
5
logo
Offer a reference bonus
1.00

DefensePro

DefensePro provides world-class DDoS protection including distributed denial of service (DDoS) attack mitigation and SSL-based DDoS attacks to fully protect applications and networks against known and emerging network security threats such denial of service attacks, DDoS attacks, Internet pipe saturation, attacks on login pages, attacks behind CDNs, and SSL-based flood attacks with: DDoS Protection With Dedicated Hardware That Protects Without Impacting Legitimate Traffic DefensePro uses a dedicated hardware platform based on Radware's OnDemand Switch supporting network throughputs up to 160Gbps. It embeds two unique and dedicated hardware components: a DoS Mitigation Engine (DME) to prevent high volume denial of service attacks and DDoS attacks, flood attacks, without impacting legitimate traffic, and a StringMatch Engine (SME) to accelerate signature detection. Centralized Attack DDoS Prevention Management, Monitoring and Reporting APSolute Vision is a DDoS prevention solution that offers a centralized attack management, monitoring and reporting solution across multiple DefensePro devices and locations. It provides the user real-time DDoS protection with identification, prioritization and response to policy breaches, cyber-attacks and insider threats. Complete Set of Security DDoS Attack Defense Mechanisms DDoS attack defense mechanisms include Intrusion Prevention System (IPS), Network Behavioral Analysis (NBA), anti-DDoS/Denial-of-Service (DoS) Protection, Reputation Engine and SSL Attack Protection. These DDoS attack defense mechanisms employ multiple detection & mitigation modules including adaptive behavioral analysis and challenge response technologies in addition to signature detection. The Accuracy of Inline, and the Scalability of Out of Path DefensePro DDoS protection and DDoS prevention devices can be deployed inline or out-of-path (OOP) in a scrubbing center to provide the highest mitigation accuracy within the shortest time. Read more about DefensePro's deployment models. Based on standard signature detection technology to prevent the known application vulnerabilities, DefensePro DDoS protection consists of patent protected behavioral based real-time signatures technology that detects and mitigates emerging network attacks in real time such as zero-minute attacks, DoS/DDoS attacks and application misuse attacks ― all without the need for human intervention and without blocking legitimate user traffic making it one of the top DDoS prevention solution.s DefensePro DDoS protection is a core part of Radware's next generation Attack Mitigation System (AMS) a set of patented technologies designed for the most advanced internet-borne cyber-attacks. AMS extends the "network" of attack detection and mitigation capabilities beyond the data center for: Cloud- hosted business services and applications Tools, servers and applications need protection within a virtualized environment Mobile work force increasingly depend on remote access to internal business applications and SaaS Advanced detection and mitigation techniques need to be ported to tomorrows open network fabrics
... Learn more
-
-
ROI-
-
18
4
logo
Offer a reference bonus
0.00

eXMeritus HardwareWall

 Boeing eXMeritus has designed HardwareWall™ as a Secure Data Transfer System and an off-the-shelf Controlled Interface that meets and exceeds all mission and information assurance requirements for the world’s highest-level security directives. These systems are the only bi-directional, cross-domain solutions in the market to have been deployed and UCDMO-certified in PL-3 (SECRET to SECRET), PL-4 (TOP SECRET to boeing2SECRET) and PL-5 (TOP SECRET to UNCLASS) environments and continue to operate and evolve to meet ever changing requirements and threats. By choosing HardwareWall™, organizations have realized the benefits of implementing a system that was designed with the needs and requirements of the community in mind. HardwareWall Benefits:
  • Broad platform support in SELinux®
  • Highly configurable and modular to allow interconnection of multiple classifications, programs, compartments, and countries
  • Rapid deployment of a proven system
  • Easily integrated into existing systems and workflows
  • Cost competitive to fit within budgetary constraints
  • Allows local development of rule sets and integration of applications
  • Complete solutions incorporating content review, data labelling, MAC, RBAC, audit, etc. and high-speed one-way transfer (10Gb Ethernet)
... Learn more
-
-
ROI-
-
7
18
logo
Offer a reference bonus
0.00

Fox IT DataDiode

Your confidential information needs to stay confidential. Your critical assets need to remain secure and your Intellectual property has to remain safeguarded at all costs. However, high levels of security often hamper productivity. To date, common practice has been to use a firewall or a so-called air gap (i.e. network separation) as a security measure to prevent data leakage or disaster. The results, however, are not satisfactory. Using a firewall means loosening the reins on security measures to achieve a more fluent workflow, which will put your data at risk. Using an air gap is too impractical. With the Fox DataDiode Appliance, you have a cross-domain solution that reconciles the seemingly contradictory requirements of high assurance and free flow of information. Its guaranteed one-way network connectivity makes sure you can securely and smoothly transfer information in real-time, 24x7. Offering the highest certified level of security and preventing unwanted access to business assets and critical systems. Key features of Fox DataDiode Appliance
  • Transfer files (using SMB, FTP/FTPS, SFTP/SCP)
  • Transfer email (SMTP)
  • Synchronize time (NTP)
New capabilities of Fox DataDiode Appliance version 2.0
  • Forward UDP and TCP data streams (e.g. SYSLOG, SNMP, video streams, etc.)
  • In combination with additional industrial software modules from Fox-IT replicate Modbus, OPC and OSIsoft PI
  • Easy customization possible
  • Adjusted proxy server specifications
  • Extra protocol support
  • Integrated content filtering
Additional improvements in Fox DataDiode Appliance version 2.0
  • The multilingual, easy-to-use web interface
  • Bandwidth increased up to 890 Mbps
Key features of Fox DataDiode hardware
  • Guaranteed one-way network connection, enforced in hardware
  • Common Criteria certified EAL 7+
  • NATO certified for the SECRET level
  • Satisfies the requirements of a data diode as set out in NERC-CIP CAN-0024
Benefits The Fox DataDiode Appliance is unique compared to other unidirectional gateways and data diodes for the following reasons:
  • Multiplexable: A single Fox DataDiode setup can support as many protocols and data channels as you wish, as long as the bandwidth permits; some alternative solutions require you to buy a separate diode for every single feature.
  • 100% hardware solution: some alternative solutions depend on embedded firmware and are essentially low-level software solutions.
  • Common Criteria certification at level EAL7+: alternative solutions are only certified to level   EAL4+ at most.
  • Independent vendor: Fox-IT is from an independent state. The Fox DataDiode has been independently evaluated by labs from all over the world, including labs linked to the governments of the US, Russian Federation and India.
  • Transparent solution: With the Fox DataDiode, you have clarity upfront. There is a clear distinction between the security guarantee and the solution middleware. Some alternative solutions have blurry distinctions such it is unclear how and where the security claim is guaranteed or implemented.
... Learn more
-
-
ROI-
-
1
0
logo
Offer a reference bonus
0.00

Gatewatcher Trackwatch

Trackwatch®, the detection system published by Gatewatcher, is based on a unique technology in weak signal analysis and machine learning, targeting abnormal behaviours by running a dynamic analysis of weak signals from inside network flows. Trackwatch® is the only product on the market with a dual approach to the threat in the exploration phase, with deep data capture and optimal analysis. It auto-adapts to polymorphic threats, in order to guarantee a strong accuracy. A turnkey solution
  • Adapted to run online connected to our smart system
  •  

  • Adapted to run fully offline for isolated and confidential networks
  •  

  • Your information belongs to you. No “Cloud” technology.
  •  

  • 0 impact on your production environment: connects with TAP or port mirroring
  •  

Why Trackwatch? Advanced threats detection by Gatewatcher Our solutions are designed for every companies, organisations or institutions willing to have an optimal threat detection capacity. A detection system qualified by the French Cybersecurity Agency This qualification meets high security and trust requirements in order for critical industries, organisations, institutions and companies to rely on. A wide range of detection probes Always close to innovation, it auto-adapts to polymorphic threats ensuring a strong accuracy against advanced threats. Benefits:
  • Detection of complex, hidden and obfuscated attacks
  • Compatible with all SIEMs available on the market
  • Intuitive dashboards and smarter analytics
... Learn more
-
-
ROI-
-
4
14
logo
Offer a reference bonus
0.00

Hirschmann Rail Data Diode

Hirschmann’s Rail Data Diode secures mission-critical Ethernet networks through guaranteed one-way data traffic, while also transferring data out of the secure part of the system in a highly controlled, deterministic manner. The data diode is protected from its severe operating environment with a metal housing, conformal coating, RJ45 and vibration-proof M12 ports, limiting wear-and-tear for a longer lifecycle.
The product also has routers with seven ports on either side. A redundant power supply increases the availability of the one-way data path.
The Hirschmann Rail Data Diode is best used in applications where data from mission-critical systems must be transferred via the public internet. The device’s physical nature and redundant power supply ensure that critical data can be securely and consistently transferred and monitored.
Ideal for industries with vital applications, such as:
  • Critical infrastructures in transportation
  • Power and chemical plants

BENEFITS
  • Reliably protect networks from external cyber threats through singular data flow
  • Securely transfer Ethernet data to the public internet without putting the system at risk
  • Easily explain product functionality for simpler governmental approval processes

FEATURES
  • Secure Ethernet ports that are safe from vulnerabilities
  • Quick data transmission speed for timely monitoring
  • Hardware-based device for easy-to-understand operation
  • Standard RJ45 and vibration-proof M12 connectors
  • Redundant voltage supply for greater availability, including 24 VDC, 110 VDC and 110/230 VAC
  • Conformal coating for protection from harsh elements
  • Industry-approved for use onboard trains and along railway tracks
... Learn more
-
-
ROI-
-
5
5
logo
Offer a reference bonus
1.70

Imperva Incapsula

Incapsula can protect your organization against any DDoS threat. WEBSITE PROTECTION Always-on DDoS protection that automatically detects and mitigates attacks targeting websites and web applications. Website Protection is an optional DDoS mitigation service that can be added to any Website Security subscription. INFRASTRUCTURE PROTECTION On-demand or always-on protection against DDoS attacks that directly target your network infrastructure. Infrastructure Protection can be used to defend entire subnets. NAME SERVER PROTECTION Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults. Name Server Protection also accelerates DNS responses. ALL-INCLUSIVE DDOS PROTECTION Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets. 10-SECOND MITIGATION SLA When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds. HIGH-CAPACITY NETWORK Our high-capacity global network holds over  (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record. ATTACK VISIBILITY Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks. BLOCK ANY TYPE OF DDOS ATTACK Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:
  • TCP SYN+ACK
  • TCP FIN
  • TCP RESET
  • TCP ACK
  • TCP ACK+PSH
  • TCP Fragment
  • UDP
  • Slowloris
  • Spoofing
  • ICMP
  • IGMP
  • HTTP Flood
  • Brute Force
  • Connection Flood
  • DNS Flood
  • NXDomain
  • Mixed SYN + UDP or ICMP + UDP Flood
  • Ping of Death
  • Smurf
  • Reflected ICMP & UDP
  • As well as other attacks
... Learn more
ROI-
-
1
4
logo
Offer a reference bonus
0.00

INFODAS SDoT Diode

The SDoT Diode is developed and manufactured in Germany following the Security by Design principle. As an unidirectional security gateway, the SDoT Diode allows government, defense, and critical infrastructure clients to maintain their confidentiality and integrity requirements for data provision or receipt in digitization and Industry 4.0 projects. Contrary to firewalls or bi-directional security gateways, data diodes don’t filter data according to policies that require continuous maintenance. Instead, a high degree of security is achieved by segmenting systems according to protection levels and enforcing unidirectional data flow. The main features of our data diode:
  • 9.1 Gbit/s;
  • Multi Protocol;
  • Secure Architecture,
Since the 1980s data diode design follows the same hardware level separation principle. A fiber optic cable is used to enforce a physical separation between domains and enforce unidirectional data flow. In electronics a diode is a component that only allows current to flow in one direction. A data diode could also be created by cutting copper-leaders in a cable but that could still present a risk as they are not galvanically separated. Although the old approach to data diodes ensures physical separation of networks without a return channel, it doesn’t meet today’s requirements for bandwidth, reliability, space, project implementation speed, or bi-directional protocols. In contrast, the SDoT Diode, as a next-generation data diode, ensures logical separation of networks without a return channel due to its unique and evaluated security architecture. Side-channel attacks are prevented through the minimized kernel. The SDoT diode allows fast and high-performance unidirectional data transfer via numerous protocols in a compact form factor between two security domains. It also offers additional functions such as HTTP response status codes. In the field of critical infrastructures (e.g. factories, oil platforms, power stations, water treatment plants), the opposite is the case. Data from the isolated area with the industrial control systems (OT) are supposed to be made available for unclassified systems or the cloud. In the public sector especially in defense, intelligence and homeland security, data diodes are generally used to provide data from sensors or unclassified systems (LOW) to a classified system (HIGH). The top priority is to protect classified data in HIGH and prevent it from leaking to LOW under all circumstances.
  • Database replication / updates;
  • Transfer of sensor data (e.g. Radar, ELINT, Satellite);
  • Lawful interception;
  • Video / Audio streaming;
  • Remote Screen View / Website mirror;
  • Patch management and malware signatures;
  • Logging and backup;
  • Secure printing.
The reverse is the case in critical infrastructure (e.g. factories, oil & gas platforms, power plants, water treatment plants). Data residing in the mission-critical industrial control systems (HIGH) must be made available for IT systems or the cloud (LOW) through a data diode.  This could be machine data for monitoring in a remote supervisory command center or predictive maintenance in a big data analytics solution. The top priority is to prevent access from LOW to the industrial control systems (HIGH) under all circumstances.
  • Database / Server replication (e.g. OPC, Modbus, Historian);
  • Transfer of OT data;
  • IT service management;
  • Managed security services (SIEM to SOC);
  • Video / Audio streaming;
  • Remote Screen View;
  • Patch management and malware signatures;
  • Logging and backup;
  • Secure printing.
... Learn more
-
-
ROI-
-
0
0
logo
Offer a reference bonus
1.40

Juniper Networks IDP Series

Stateful signature The IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives. Protocol anomaly The IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities. Traffic anomaly The Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities. Backdoor The Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised. IP spoofing The IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source. Layer 2 attacks The IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning. Denial of service (DoS) The SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks. Network honeypot The IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.
... Learn more
ROI-
-
7
0
logo
Offer a reference bonus
0.00

Nexor Data Diode

In high security environments, it is often difficult to make a physical connection between different networks but there is still a need to share information. Consequently, a common form of data transfer is the “Air Gap” – physically transferring the information via USB stick, DVD or other portable storage media. However, these portable devices become a security risk in their own right. As this method is not in real-time, this approach also becomes impractical with today’s information volumes and time pressures. In many instances, networks are therefore joined to overcome these issues without suitable levels of security or protection being put in place beforehand. The Nexor Data Diode is an EAL7+ evaluated solution (the highest certification possible) which, due to its physical design, will only allow data transfer in one direction unlike technologies such as firewalls. This gives a 100% guarantee that no data can ever leak back to the untrusted network.
Originally developed for use by defence and government organisations, the Nexor Data Diode is used in environments that require high assurance solutions.
The Nexor Data Diode has been deployed in a variety of secure environments including file importing; system updates; network monitoring; print management; camera control; and process control interfaces.
The Nexor Data Diode performs the Flow Control element of our нашей архитектуре безопасного обмена информацией (SIXA®). This architecture is based on a modular design that offers both security and flexibility, whilst aligning to architectural patterns from the National Cyber Security Centre (NCSC) - the UK National Technical Authority for Information Assurance.

KEY FEATURES
  • 100% guaranteed one-way information exchange
  • Common Criteria EAL7+ evaluated
  • High transfer speed and data reliability
  • High throughput, ruggedised and small form factor options available
KEY BENEFITS
  • Secure data transfer to the isolated network(s)
  • Prevents data leakage from secure networks
  • Range of evaluations to simplify accreditation
... Learn more
-
-
ROI-
-
16
2
logo
Offer a reference bonus
0.00

Owl Perimeter Defense Solution

OPDS product line represents the gold standard in data diode cybersecurity, designed to support the varied and complex cybersecurity needs within the wide range of critical infrastructure industries. Acclaimed for their unmatched performance, reliability, and ease of use, OPDS data diodes protect the operational networks and digital assets of some of the world’s largest critical infrastructure facilities, including power plants, banks, substations, laboratories, oil rigs, and more.
The concept is to protect the control systems within the facility by creating a secure cyber perimeter around the plant so that plant operations are not interrupted, sabotaged or otherwise impacted by some kind of cyberattack. Depending on problems that need to be solved, there are wide range of OPDS types.

OPDS-5D

An entry level data diode solution created to address cybersecurity use cases with lower, fixed bandwidth requirements of 5 Mbps or less. The OPDS-5D features a compact, DIN rail compatible single box enclosure, conditioned for a range of applications, from climate controlled IT centers to extreme environments with high/low temperatures, dust, or smoke.

OPDS-100D

Optimized to meet the needs of most industrial control applications, the OPDS-100D delivers scalable, deterministic one-way transfer capabilities from 10 Mbps up to 104 Mbps. Designed specifically for low size, weight, and power (SWaP) requirements, the compact form factor is DIN rail mountable and readily deployable in plants, substations, and other CI facilities.

OPDS-100

Owl’s standard, all in one, 1U rack-mountable DualDiode® cybersecurity platform, designed to address critical infrastructure applications requiring low to moderate data throughput. The OPDS-100 delivers scalable performance from a base of 10 Mbps up to 104 Mbps, easily upgradeable through Owl’s variable bandwidth licensing mechanism.

OPDS-1000

A highly integrated, all in one, 1U rack-mountable cybersecurity platform. The OPDS-1000 represents the pinnacle of single-box data diode solutions and supports the high-speed one-way transfer of multiple data types/formats concurrently. Optimized for more demanding applications, it delivers a scalable link rate from 104 Mbps up to 1 Gbps with variable bandwidth licensing.

EPDS

The  most  powerful  and  capable  data  diode  solution  available  on  the  market,  the  EPDS  integrates  patented  Owl DualDiode® communication cards into two commercial enterprise servers, providing maximum processing power  and  storage.  The  EPDS  operates  on  a  hardened  Linux  operating  system  and  supports  upgradable  link  speeds from 155 Mbps up to 10 Gbps.

... Learn more
-
-
ROI-
-
12
11

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.