View
Sorting
Products found: 33
Arbit Data Diode
The Arbit Data Diode has the following features:
- More hardware configurations available
- Maximum file size limited only by available disk space
- Based on gigabit network interfaces
- Transports all file types and emails with full transaction control
- Unlimited number of data channels
- Data channel priority (on transaction basis)
- Supports up to 24 streaming channels (video, radio, etc.)
- Back Pressure in case of critical diskspace
- Safe points in case of increased data flow
- Notifications by email: Required retransmissions, Daily operational statistics, Total count and size of transactions within last 24h.
- Operated by web-interfaces
- No daily maintenance
- Software based on hardened Linux
- Support Supervisory Control and Data Acquisition (SCADA) networks
- Support Industrial Control Systems (ICS)
SUPPORTED PROTOCOLS
- Mail (SMTP)
- Simple file transfer (FTP, SFTP)
- Windows share mapping (SMB)
- Time synchronization (NTP)
- HTTP/HTTPS forwarding
- Streaming (UDP/TCP)
Arbor APS
BIG-IP Local Traffic Manager
Calyptix AccessEnforcer UTM Firewall
- UTM Firewall. A managed firewall with deep packet inspection that blocks threats to your network before they can cause harm. Prevent scans, spoofing, SYN floods, DDoS attacks, fragmentation attacks, and more automatically.
- GUI-Based Management. Graphic interface that allows technicians to configure and monitor the network with clicks instead of code. Check network alerts, change settings, or set a DMZ with a single click.
- VPN Unlimited. Two VPN services provide fast and secure connections to your remote network. Create an unlimited number of VPN clients and policies, and let users connect with Android, iOS, OS X, and Windows devices.
- Web Filtering. Monitors and controls web browsing for any and all users on the network. Set policies to allow or deny specific types of content and filter by topic, keyword, extension, and file type. Customize the block page and set policies to apply only at certain times. Activate the HTTPS filter with a single click.
- Email Filtering. Scans incoming emails with multiple anti-virus and anti-spam engines and checks them against real-time DNS blacklists. Filter email by geography, keyword, and global whitelist and blacklist, and allow users to manage individual spam folders. Supports SMTP and easy integration with Microsoft Exchange.
- Intrusion Detection & Prevention. Examines the contents of every packet for malicious content with IDS/IPS before it enters the network. Set to block or log potential threats, and ban malicious hosts automatically with dynamic blacklisting mode.
- Quality of Service (QoS). Ensure VoIP phones and other critical systems are not robbed of network bandwidth by non-essential traffic. Allocate or limit bandwidth for any source or destination, and allow systems to “borrow” spare bandwidth when available.
Check Point 21000 Appliances
Check Point 600 Appliance
Check Point Intrusion Prevention System Software Blade
- Next-generation security prevention, protection and performance
- Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
- Check Point is ranked #1 in Microsoft and Adobe threat coverage
- Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
- Unrivaled, multi-Gigabit performance in an integrated IPS
- Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
- Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
- CoreXL technology provides the most efficient and high-performance use of multi-core technologies
- Lowest TCO and fastest ROI of any enterprise-class firewall solution
- One-click activation of IPS and firewall protection on any Check Point gateway
- Delivers unmatched extensibility and flexibility—all without adding CapEx
- Integrated into Check Point Software Blade Architecture for on-demand security
- Malware attacks
- Dos and DDoS attacks
- Application and server vulnerabilities
- Insider threats
- Unwanted application traffic, including IM and P2P
- Geo-protections
- New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.
- Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.
- Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.
- Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.
- Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.
- Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.
- Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.
Check Point vSEC Virtual Edition
Crypthomathic Authenticator
Strong authentication provides a long-term, strategic solution for protecting against online attacks, such Phishing, Trojans, etc. Digital authentication is about putting measures in place to confirm an individual is who they say they are, so that only the right individual has access to certain information. Strong Customer Authentication systems should be flexible to easily allow different authentication mechanisms to be used depending on the protection profile of users or changes to the security landscape. Cryptomathic delivers the complete solution or individual components for implementing large-scale strong authentication services. The Cryptomathic Authenticator is a Multi-Factor Authentication server designed for scalable applications, such as eBanking and eGovernment, with complete support for a wide range of tokens to seamlessly match the current and future security needs of all user segments.
Multi-Factor Authentication
- CAP / DPA
- VISA CodeSure
- Digital signatures
- Matrix cards
- OATH (HOTP / TOTP / OCRA)
- OTP proprietary tokens (e.g. Vasco)
- Pattern recognition
- PKI
- Secure fax
- Smart phone applications (e.g. Cryptomathic)
- SMS OTP
- Static & partial user name and password
Authentication End-to-end Security
The Authenticator provides a much more secure and comprehensive solution than any other authentication systems - addressing a variety of issues such as audit, compliance and dual control. Here are some of the features:
- HSMs (Hardware Security Modules), securing cryptographic keys and authentication data
- Attack detection, e.g. invalid authentication attempts
- Administrator Security - remote admin client, chip
- Card log-on, separation of duties and dual controls
- Tamper evident audit logs, including usage log and security log
- Database, e.g. HSM encryption
Flexible & Future Proof
Criminals try to defraud users and steal their identities and in various simple and sophisticated ways. The Authenticator addresses relevant attacks and we will continue to add best in class authentication methods over time that foil future attacks ensuring that our customers stay ahead of the criminals. Current major attacks include:
- Internal Attack
- Man-In-The-Browser
- Man-In-The-Middle
- Mining
- Pharming
- Phishing
- Social Engineering
- Trojan
Authentication Scalability
The Authenticator is scalable and is used by customers for managing anywhere from a few thousand users to several million.The solution is the best 2FA solution for large roll-outs due to its performance and scalability features:
- Fail-over, e.g. back-up or disaster recovery
- Clustering
- Load balancing across servers and HSMs
Authenticator Return on Investment
Support for multiple authentication mechanisms allow companies to achieve full flexibility in adapting and modifying token strategies while avoiding token vendor lock-in.
This ensures the highest ROI of all authentication servers as our customers can shop around for the most cost efficient authentication method.
Data Capture Unit (DCU)
Industrial data diode designed to deliver the highest level of security to OT networks like industrial control systems (ICS) and safety critical infrastructure via physical isolation when there’s a need to connect them to a lower security network (IT Networks or Internet) for replication or analytics.
The DCU is designed and manufactured in Germany, its chip design forces data to flow one-way only using a unique electromagnetic induction design, to collect data and guarantee that there’s no physical path for remote access to the OT Network.
The DCU has a software complement called, OWG (One-way gateway) software, its two agents, a OWG sender capable of data collection of several protocols (FTP, OPC UA, Syslog), filtering and aggregating data in the OT network (Edge) to then push it thru the DCU and a OWG receiver, which receives data from the DCU and can be configured to send it directly to the cloud (AWS or MindSphere) or to another computer in the IT network.
The DCU and OWG are vendor neutral and support Windows or Linux systems.
DefensePro
eXMeritus HardwareWall
- Broad platform support in SELinux®
- Highly configurable and modular to allow interconnection of multiple classifications, programs, compartments, and countries
- Rapid deployment of a proven system
- Easily integrated into existing systems and workflows
- Cost competitive to fit within budgetary constraints
- Allows local development of rule sets and integration of applications
- Complete solutions incorporating content review, data labelling, MAC, RBAC, audit, etc. and high-speed one-way transfer (10Gb Ethernet)
Fox IT DataDiode
- Transfer files (using SMB, FTP/FTPS, SFTP/SCP)
- Transfer email (SMTP)
- Synchronize time (NTP)
- Forward UDP and TCP data streams (e.g. SYSLOG, SNMP, video streams, etc.)
- In combination with additional industrial software modules from Fox-IT replicate Modbus, OPC and OSIsoft PI
- Easy customization possible
- Adjusted proxy server specifications
- Extra protocol support
- Integrated content filtering
- The multilingual, easy-to-use web interface
- Bandwidth increased up to 890 Mbps
- Guaranteed one-way network connection, enforced in hardware
- Common Criteria certified EAL 7+
- NATO certified for the SECRET level
- Satisfies the requirements of a data diode as set out in NERC-CIP CAN-0024
- Multiplexable: A single Fox DataDiode setup can support as many protocols and data channels as you wish, as long as the bandwidth permits; some alternative solutions require you to buy a separate diode for every single feature.
- 100% hardware solution: some alternative solutions depend on embedded firmware and are essentially low-level software solutions.
- Common Criteria certification at level EAL7+: alternative solutions are only certified to level EAL4+ at most.
- Independent vendor: Fox-IT is from an independent state. The Fox DataDiode has been independently evaluated by labs from all over the world, including labs linked to the governments of the US, Russian Federation and India.
- Transparent solution: With the Fox DataDiode, you have clarity upfront. There is a clear distinction between the security guarantee and the solution middleware. Some alternative solutions have blurry distinctions such it is unclear how and where the security claim is guaranteed or implemented.
Gatewatcher Trackwatch
- Adapted to run online connected to our smart system
- Adapted to run fully offline for isolated and confidential networks
- Your information belongs to you. No “Cloud” technology.
- 0 impact on your production environment: connects with TAP or port mirroring
- Detection of complex, hidden and obfuscated attacks
- Compatible with all SIEMs available on the market
- Intuitive dashboards and smarter analytics
Hirschmann Rail Data Diode
The product also has routers with seven ports on either side. A redundant power supply increases the availability of the one-way data path.
The Hirschmann Rail Data Diode is best used in applications where data from mission-critical systems must be transferred via the public internet. The device’s physical nature and redundant power supply ensure that critical data can be securely and consistently transferred and monitored.
Ideal for industries with vital applications, such as:
- Critical infrastructures in transportation
- Power and chemical plants
BENEFITS
- Reliably protect networks from external cyber threats through singular data flow
- Securely transfer Ethernet data to the public internet without putting the system at risk
- Easily explain product functionality for simpler governmental approval processes
FEATURES
- Secure Ethernet ports that are safe from vulnerabilities
- Quick data transmission speed for timely monitoring
- Hardware-based device for easy-to-understand operation
- Standard RJ45 and vibration-proof M12 connectors
- Redundant voltage supply for greater availability, including 24 VDC, 110 VDC and 110/230 VAC
- Conformal coating for protection from harsh elements
- Industry-approved for use onboard trains and along railway tracks
Imperva Incapsula
- TCP SYN+ACK
- TCP FIN
- TCP RESET
- TCP ACK
- TCP ACK+PSH
- TCP Fragment
- UDP
- Slowloris
- Spoofing
- ICMP
- IGMP
- HTTP Flood
- Brute Force
- Connection Flood
- DNS Flood
- NXDomain
- Mixed SYN + UDP or ICMP + UDP Flood
- Ping of Death
- Smurf
- Reflected ICMP & UDP
- As well as other attacks
INFODAS SDoT Diode
- 9.1 Gbit/s;
- Multi Protocol;
- Secure Architecture,
- Database replication / updates;
- Transfer of sensor data (e.g. Radar, ELINT, Satellite);
- Lawful interception;
- Video / Audio streaming;
- Remote Screen View / Website mirror;
- Patch management and malware signatures;
- Logging and backup;
- Secure printing.
- Database / Server replication (e.g. OPC, Modbus, Historian);
- Transfer of OT data;
- IT service management;
- Managed security services (SIEM to SOC);
- Video / Audio streaming;
- Remote Screen View;
- Patch management and malware signatures;
- Logging and backup;
- Secure printing.
Juniper Networks IDP Series
Nexor Data Diode
Originally developed for use by defence and government organisations, the Nexor Data Diode is used in environments that require high assurance solutions.
The Nexor Data Diode has been deployed in a variety of secure environments including file importing; system updates; network monitoring; print management; camera control; and process control interfaces.
The Nexor Data Diode performs the Flow Control element of our нашей архитектуре безопасного обмена информацией (SIXA®). This architecture is based on a modular design that offers both security and flexibility, whilst aligning to architectural patterns from the National Cyber Security Centre (NCSC) - the UK National Technical Authority for Information Assurance.
KEY FEATURES
- 100% guaranteed one-way information exchange
- Common Criteria EAL7+ evaluated
- High transfer speed and data reliability
- High throughput, ruggedised and small form factor options available
- Secure data transfer to the isolated network(s)
- Prevents data leakage from secure networks
- Range of evaluations to simplify accreditation
Owl Perimeter Defense Solution
The concept is to protect the control systems within the facility by creating a secure cyber perimeter around the plant so that plant operations are not interrupted, sabotaged or otherwise impacted by some kind of cyberattack. Depending on problems that need to be solved, there are wide range of OPDS types.
OPDS-5D
An entry level data diode solution created to address cybersecurity use cases with lower, fixed bandwidth requirements of 5 Mbps or less. The OPDS-5D features a compact, DIN rail compatible single box enclosure, conditioned for a range of applications, from climate controlled IT centers to extreme environments with high/low temperatures, dust, or smoke.OPDS-100D
Optimized to meet the needs of most industrial control applications, the OPDS-100D delivers scalable, deterministic one-way transfer capabilities from 10 Mbps up to 104 Mbps. Designed specifically for low size, weight, and power (SWaP) requirements, the compact form factor is DIN rail mountable and readily deployable in plants, substations, and other CI facilities.OPDS-100
Owl’s standard, all in one, 1U rack-mountable DualDiode® cybersecurity platform, designed to address critical infrastructure applications requiring low to moderate data throughput. The OPDS-100 delivers scalable performance from a base of 10 Mbps up to 104 Mbps, easily upgradeable through Owl’s variable bandwidth licensing mechanism.OPDS-1000
A highly integrated, all in one, 1U rack-mountable cybersecurity platform. The OPDS-1000 represents the pinnacle of single-box data diode solutions and supports the high-speed one-way transfer of multiple data types/formats concurrently. Optimized for more demanding applications, it delivers a scalable link rate from 104 Mbps up to 1 Gbps with variable bandwidth licensing.EPDS
The most powerful and capable data diode solution available on the market, the EPDS integrates patented Owl DualDiode® communication cards into two commercial enterprise servers, providing maximum processing power and storage. The EPDS operates on a hardened Linux operating system and supports upgradable link speeds from 155 Mbps up to 10 Gbps.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.





















