View
Sorting
Products found: 21
Cisco ONS 15454 Series
Cisco ROADM innovation continues into its fourth generation with the first Single Module ROADM. It combines multidegree wavelength switching functionality with optical amplification and spectrum analysis in a single slot line card.
Utilize new features
Along with advanced features, the 15454 provides wavelength switched optical network functionality. This embeds optical layer intelligence directly into network elements to support wavelength-on-demand services and dynamic restoration.
Gain flexible aggregation
Cisco optical transport aggregation solutions integrate packet, SONET, and OTN aggregation and switching into the DWDM transport platform. Customers will enjoy efficient wavelength fill and tight communication among network layers.
Streamline operations
Selected on a per card basis, a mix of Layer 1 services, time division multiplexing (TDM), and packet switching technologies can be deployed where needed. Meet customer and network requirements while simplifying operations.
Scale to 100 Gb and beyond
Cisco leads the optical transport industry as it moves toward coherent technology for DWDM transport of 100 Gb services. Powered by nLight Silicon, Cisco coherent technology will scale to even greater densities and higher bit rates.
Cybereason Platform
Cybereason Offerings Deep Hunting Platform The Cybereason Deep Hunting Platform delivers endpoint detection and response (EDR), nextgeneration antivirus (NGAV), managed threat hunting, and threat intelligence — all in one solution and one single lightweight sensor.
Built using Cybereason's proprietary cybersecurity data analytics architecture, the platform focuses on collecting and analyzing behavioral data and correlating disparate data points to identify malicious operations and facilitate immediate action. The Cybereason Deep Hunting Platform doesn't simply secure your data; it leverages your data to secure.
Cybereason Complete Endpoint Protection Implement comprehensive endpoint protection with Cybereason’s Complete Endpoint Protection platform. The solution integrates the power of EDR and next-generation antivirus (NGAV) so you can replace your legacy AV with a single advanced endpoint solution.
- Combination of centralized and endpoint-side analytics
- Behavioral analysis in the Cybereason Hunting Engine
- Full attack lifecycle protection
- Single sensor and single Response Interface
Cybereason RansomFree Keep your personal files safe from ransomware with Cybereason RansomFree. Built on the same Cybereason detection methodology, RansomFree is protection software designed to detect and stop ransomware from encrypting your files. With a mission to help everyone – not just large enterprises, it provides RansomFree at no cost because protection should be accessible to everyone.
CyCognito platfrom
Manage Your Attack Surface
The CyCognito platform helps you identify all of the attacker-exposed assets in your IT ecosystem for a complete view of your attack surface. With its comprehensive global botnet, the CyCognito platform uniquely reveals unknown and unmanaged assets associated with your organization – including those in cloud, partner and subsidiary environments – that are critical to your cybersecurity risk management. In fact, CyCognito helps organizations identify 30 to 300% more assets than they knew existed prior to using the CyCognito platform.Prioritize and Eliminate Attack Vectors
The CyCognito platform helps you eliminate critical attack vectors with a continuously updated and prioritized view of your attacker-exposed IT ecosystem. You and your security team can use the CyCognito platform to pinpoint critical risks just as attackers do. Organizations that still have to perform legacy external testing to meet customer agreements or compliance regulations use the CyCognito platform to augment and optimize those processes by focusing the legacy tests on the areas of greatest risk that the CyCognito platform has identified.Monitor Subsidiary Risk
The CyCognito platform gives you immediate visibility of the security posture of your subsidiaries and organizations you are evaluating for merger or acquisition. It identifies their attack surfaces and the effectiveness of their security controls, without requiring any deployment or configuration.
Global Bot Network
CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed.
Asset Mapping
- Web applications
- Keyword and code fragments
- Logos and icons
- Deployed software
- TLS configuration
- IP ranges
Multi-Vector Attack Simulator
Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting.
SECURITY MODULES
Public Techniques:
Vulnerability assessment
Encryption analysis
Proprietary Techniques:
Authentication testing
Misconfiguration detection
Network design analysis
Data exposure detection
Code injection risks
Protecting Your Organization from Shadow Risk
Explore the different ways CyCognito helps take your cybersecurity risk out of the dark.- Completely External
Operates externally and continuously in the cloud, with no impact on business continuity.
- Configuration Free
No need for software deployment, integration or configuration. It just works immediately, out of the box.
- Runs Automatically
Works independently across your organization’s environment, without affecting operations.
Ericom Shield Remote Browser Isolation (RBI)
- Websites are rendered in isolated containers in the cloud or DMZ, so no active content ever reaches endpoints
- Proxy-based access – easily integrates with all secure web gateways
- URL redirection to virtual browsers in the cloud or DMZ
- Zero installation on the endpoint
- Works with any endpoint browser, device and OS
- Embedded URL filtering
- Category-based policy management
- Comprehensive activity reporting and logging
- Highly-available distributed cloud platform delivers 99.999% uptime
- Neutralizes the most prevalent cyber attack vectors -- browsing & email
- Keeps employees productive by providing a secure, cost-effective native browsing experience
- Protects users from sophisticated social engineering, credential theft and phishing attacks
- Air-gaps browser-executable code, email links and downloads away from endpoints
- Opens each tab in a unique, disposable container to eliminate cross-site scripting attacks
- Simplifies IT operations by minimizing false positives and helpdesk calls
- Works with all browsers, devices and operating systems
- Flexibly scales as organizations need to add isolation to cover incremental users
Niagara Visibility Controller
- Centralized management, monitoring and configuration of multiple visibility nodes.
- Reducing configuration time and errors.SDN architecture - OpenFlow discovery and topology visualization.
- User-friendly and intuitive Fabric Flow creation.
- Easy-to-complete firmware updates and configurations updates of multiple visibility nodes from a single pane-of-glass UI.
- REST API Support for programmability.
- Unified management for network packet brokers, network bypasses, and network taps.
- Ability to see the ‘forest’ and the ‘trees’.
- Seamlessly navigate between three panes of management, from Group view to detailed Device view.
- Available in a self-install Virtual Machine package.User Management, User Roles, and Authentication.
Profitap vTAP
- Enables security, availability, and performance through proactive monitoring of virtual data centers
- Complete visibility of traffic in virtual environments, eliminating blind spots
- Central management interface for a single overview of the entire virtual visibility system
- Filtering helps bring down the virtual traffic to actionable data and prevent network congestion
- Easily scalable
- Forward virtual traffic back into physical network for analysis
Protectimus ADFS
One-time passwords delivery
There are many one-time passwords delivery options to choose from: hardware OTP tokens, the free one-time password generator - Protectimus Smart app, OTP delivery by chatbots in messengers, SMS, or email. We've got them all!- Email. OTP delivery by email. Consider, that the level of security offered by this token is less than that of hardware tokens
- SMS. Delivery of one-time passwords over SMS. Note: additional costs for SMS delivery and risks may apply
- Smart. Application for one-time passwords generation. Free and effective 2FA tool. Available for Android and iOS.
- Two. A hardware OTP token in the form of a key fob. Resistant to moisture, dust, and impacts. Secret key is hard-coded
- Slim. A hardware OTP token in the form of a credit card. Resistant to moisture, dust. Secret key is reflashable over NFC
- Messengers. Free one-time password delivery through chatbots on Facebook Messenger, Telegram, and Viber
Two-factor authentication over Microsoft AD FS 3.0 and 4.0
With Protectimus, you can quickly and easily ensure a high level of protection for access to corporate web services and cloud resources by setting up two-factor authentication over AD FS 3.0 and 4.0 Reliable protection Protectimus’s OATH-certified two-factor authentication solution is the best choice for protecting access to corporate applications if you use ADFS. Authentication using one-time passwords from Protectimus is a reliable means of protecting against brute-force attacks, keyloggers, most phishing attacks, social engineering, and man-in-the-middle attacks. 15-minute setup If you use Active Directory Federation Services (AD FS) 3.0 or 4.0 in your network infrastructure, integrating a two-factor authentication solution from Protectimus will take no more than 15 minutes. Download the installer and setup instructions for the Protectimus ADFS component below. If you have any questions, contact our support team at support@protectimus.com. Compatibility with a range of services Through ADFS 3.0 and 4.0, you can configure Protectimus two-factor authentication for a wide variety of cloud services, including AWS, Asana, Desk, Dropbox, Evernote, Expensify, Freshdesk, GitHub, GoToMeeting, Jira SSO, Namely, Microsoft Office 365, OpenDNS, Salesforce, Citrix ShareFile, Slack, Splunk, SugarCRM, Sumo Logic, Cisco Webex, Workday, Workplace, Zendesk, and Zoom.Extensive functionality
We offer not only a reliable two-factor authentication system compatible with ADFS, but also an extensive array of features, making the administration of Protectimus 2FA solution easy, intuitive, and effective Time filters Using time-based filters, you can easily manage employees' access times to corporate resources. An administrator can set up Protectimus ADFS two-factor authentication to allow employees to log into their accounts only at a predefined time, such as during business hours. At other times, logins will be blocked. Event notifications Protectimus ADFS multi-factor authentication system administrators have access to a range of administrative tools, including event notification functionality. The event monitoring feature allows an administrator to receive notifications about each important event that takes place in the system, sent directly to their phone or email. Unified authentication ecosystem With Protectimus, you can set up a powerful authentication ecosystem and manage all 2FA nodes from a single admin panel. The Protectimus two-factor authentication solution supports integration with ADFS, RADIUS, SAML, Citrix NetScaler, Citrix XenApp, VMware, RoundCube, Microsoft RDP and WinLogon right out of the box.Rebasoft
- Network & perimeter security
- Improve Platform Security
- Ensure compliance
- Active security
- Automation
Reservoir Labs R-Scope
Secure Decisions Flying Squirrel
- Easy-to-use graphical interface with both Windows and Linux
- Supports 802.11a/b/g/n
- Real-time protocol analysis
- Cloaked network discovery
- Arbitrarily filter, search, and sort networks
- Statistical analysis of captured network traffic
- Customizable report generation
- Real-time signal strength interpolation
- Real-time drive path & logical network visualization
- Integrated Geographic Information System (GIS)
- Google Earth export
- Filter networks by geographic area
- Blueprint overlay
ShieldIOT Network Security
- Unmatched Accuracy. ShieldIOT Corset-based AI anomaly detection is x5 to x20 more accurate compared to leading industry solutions
- Real-Time Detection. From one week to one minute. No speed or accuracy trade-offs. Detect the first signs of attack before damage takes place.
- Actionable Alerts. Attack type, duration, affected devices, score, severity, trigger features… Enabling automated or non-expert threat mitigation
- Unlimited Scalabilty. Transforms huge volumes of big data into small data sets. Agent-less solution with no device or network changes
- Data Processing. Data filtering, null completion, data sources joining, data enrichment, feature engineering
- AI Engine. Coreset computing to reduce the data, followed by running a set of AI and machine learning detection models.
- Anomaly Classification. Automatically generate event type, by combining patented labeling process with domain expertise
Siege Technologies Hauberk
- Minimize exploitation of a compromised system
- Reduce the impact of a successful attack
- Make the attacker’s tasks substantially more complex
- Dramatically changes the attack surface
- Web interface and back-end command line interface allow for scripting and deployment on a set of servers
- Seamless batch processing for generation of a large number of varying configurations
- Fast processing time for generating large configurations
- Scripting with normal build / regression testing suites
Skybox Change Manager (CM)
- Fully automate firewall change management workflows, improving communication and efficiency across security teams
- Validate proposed firewall changes by checking for access and rule policy violations, as well as new vulnerabilities
- Use formalized tickets and closed-loop workflows to ensure changes match the original intent
- Customize and simplify processes to reduce change management time by 80 percent*
- Establish end-to-end rule life cycle management for secure infrastructure and optimized firewalls
- Reduces the chance of human errors and rollbacks of incorrect changes
- Enables customizable change workflow based on type of request
- Ensures accurate change planning and implementation within the context of the network
- Provides option for automated provisioning for select firewall changes
- Automates rule recertification workflow
- Calculates change risk to inform decisions on when next to review rule
- Streamlines review process by maintaining information on stakeholders
- Identifies potential compliance issues and vulnerability exposures to new portions of the network a proposed change could introduce
- Models change impact on network security and compliance before implementation
- Establishes a fully automated approval process from change request through implementation and verification
- Delivers a complete and verifiable audit trail and change reconciliation report
- Provides closed-loop change management capabilities to ensure all changes are implemented as intended
Skybox Horizon
Horizon isn’t just a topology map. It’s the product of intelligence from the entire Skybox® Security Suite in a single pane of glass. Horizon provides an abstracted view of the deeper Skybox model that includes hybrid network topology — across on–prem, multi–cloud and operational technology (OT) environments — security controls, assets, vulnerabilities and threats. BENEFITS OF SKYBOX HORIZON Unifies Data in a Simple Picture
- Consolidates data silos from endpoint and network security products, including physical IT, multi–cloud and OT networks
- Incorporates data provided by vendors and Skybox® Research Lab intelligence of exploits in the wild and available exploit code
- Creates a map of servers, endpoints, security and networking devices and hybrid network topology and gives insights to security exposures
- Quickly shows exposed vulnerabilities and vulnerability exploit status based on intelligence from the current threat landscape
- Prioritizes IOEs to reflect the risk and likelihood of an attack
- Filters IOEs by types and severity level for dynamic analysis
- Identifies vulnerabilities that pose the most risk across the entire enterprise, based on your attack surface and the threat landscape
- Distinguishes between real exposures and security issues that are effectively mitigated by compensating controls
- Enables security leaders to direct resources to patching or remediating systems and applications most at risk
- Develops a common understanding of risks and remediation priorities across technical and business groups
- Justifies security investments to CEO and CFO
- Tracks and reports on progress toward strategic security or compliance goals with IOE trends or historical comparisons
Skybox Network Assurance (NA)
- Visualize and interact with a model of your entire network topology, assets and security controls
- Keep security zones and device configurations in continuous compliance and working to reduce your attack surface
- Troubleshoot network connectivity and identify root causes of network outages to ensure business continuity and continuous uptime
- Collects data from 130+ network and security devices (see the full list on our website)
- Displays detailed, normalized configurations of firewalls and routers, as well as virtual assets
- Creates a network topology map that unifies traditional IT, public and private clouds and OT networks that can be exported to Microsoft Visio
- Minimizes downtime by reducing network configuration errors
- Troubleshoots network device configurations and previews changes before implementation
- Identifies root causes of outages quickly and accurately
- Improves visibility and workflow for network security teams
- Correlates all ACLs (including those for cloud assets), security tags, routing rules, NAT, proxies, VPNs and more to find blocked or allowed access
- Incorporates asset vulnerability data for physical or virtual machines in network path analysis
- Analyzes network paths in public and private cloud environments for both north–south and east–west traffic
- Performs continuous compliance analysis for configurations and security zone policies
- Normalizes security tags and other access rules throughout hybrid networks
- Enables security policy customization
Skybox Security Suite
- Network topology (routers, load balancers, switches)
- Security controls (firewalls, IPS, VPN)
- Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)
- Vulnerabilities and threats
- Vulnerability severity
- Compliance
- Age
- Location
- Exploitability
- Prevalence (density)
- Asset role
- Asset value
- Threats
- Network topology
- Security controls
- Create analytics–driven, automated processes that scale and adapt to a growing network
- Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors
- Streamline the creation of new firewall rules and efficiently manage rule recertification
- Perform same–day audits and simplify reporting
- Skybox® Vulnerability Control
- Skybox® Change Manager
- Skybox® Firewall Assurance
- Skybox® Network Assurance
- Skybox® Horizon
- Skybox® Research Lab
Soosan eReD Hypervisor Security
- Blocks New Threats
- Prevents Data Leaks and Corruption
- Web Page Tampering Prevention
- Security that cannot be Disabled or Bypassed
- Blocks Malware (including ransomware)
- Supports a Range of Operating Systems
- Makes More Efficient Use of Server Resources
- Easy-to-Use UI
- Fulfills ISMS Certificate Requirements
- File Access Control
- Process Execution Preventing
- Logging/Monitoring
- Supports a Wide Variety of OSs
- Blocks all Cyber Attacks
- Robust Data Protection
- Effective Server Resource Usage
STT LLC STTarx
Tempered Networks Airwall
- Windows
- macOS
- iOS/iPadOS
- Android
- Windows Server
- Linux
- Cloud
- Virtual
- Physical
- Connectivity
- Cloud
- Virtual
- Physical
- Cloud
- Virtual
- Physical
Tripwire Enterprise
- Detection of cyber threats and possible breach activity by highlighting possible indicators of compromise.
- Response to deviations with high value, low volume alerts with guidance on what to do to return the system to a known secure state.
- Prevention through adapting and prioritizing threats and change deviations to maintain a consistently hardened and objective view of overall security posture across all devices and systems.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.