View
Sorting
Products found: 84
Aruba Switch…
The Aruba Switch provides security, reliability, and ease of use for enterprise edge, branch office, and SMB deployments.
Check Point 1200R…
Features
Wide range of appliances for IT and OT networks The 1200R Rugged Appliance complements our extensive appliance family to support a diverse range of deployment environments and meet specialized requirements in ICS security. The 1200R complies with industrial specifications such as IEEE 1613 and IEC 61850-3 for heat, vibration and immunity to electromagnetic interference (EMI). In addition, the 1200R is certified for maritime operation per IEC-60945 and IACS E10 and complies with DNV 2.4. The 1200R Appliances can also be used in commercial deployments. Inspect Encrypted Connections There is a shift towards more use of HTTPS, SSL and TLS encryption to increase Internet security. At the same time files delivered into the organization over SSL and TLS represent a stealthy attack vector that bypasses traditional security implementations. Check Point Threat Prevention looks inside encrypted SSL and TLS tunnels to detect threats, ensuring users remain in compliance with company policies while surfing the Internet and using corporate data. Next-Generation Firewall Check Point Application Control has broad support for specialized Industrial Control System and SCADA protocols with granularity for over 800 SCADA specific commands. This enables protocol-specific visibility and controls with directional awareness. Integrated threat detection and prevention Detect and prevent targeted attacks against ICS/SCADA components in Operational Technology (OT) environments with specific protections for these highly vulnerable, unpatched, legacy embedded systems. Our threat prevention technologies have the best catch rate in the industry and can be deployed in detect-mode to minimize the disruption of operational processes. Best-in-class management Administrators can define security policy for the entire network — including internal security, main sites, and remote sites — from a single, centrally located Check Point Security Management server. With SmartProvisioning™, a profile-based management approach designed for large- scale deployments, administrators can define a single security and device profile and apply it simultaneously to thousands of appliances — dramatically reducing deployment time and administrative overhead.Benefits
- Deploy SCADA networking security in harsh environments and remote locations
- Full visibility and granular control of SCADA traffic
- Comprehensive security with SCADA-aware threat detection and prevention
Check Point 21000 Appliances…
Check Point 600 Appliance…
Check Point Intrusion Prevention System Software Blade…
- Next-generation security prevention, protection and performance
- Industry-leading intrusion protection and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
- Check Point is ranked #1 in Microsoft and Adobe threat coverage
- Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
- Unrivaled, multi-Gigabit performance in an integrated IPS
- Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
- Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
- CoreXL technology provides the most efficient and high-performance use of multi-core technologies
- Lowest TCO and fastest ROI of any enterprise-class firewall solution
- One-click activation of IPS and firewall protection on any Check Point gateway
- Delivers unmatched extensibility and flexibility—all without adding CapEx
- Integrated into Check Point Software Blade Architecture for on-demand security
- Malware attacks
- Dos and DDoS attacks
- Application and server vulnerabilities
- Insider threats
- Unwanted application traffic, including IM and P2P
- Geo-protections
- New protections sandbox – Build confidence in a ‘sandbox’ environment with no impact on your network.
- Automatic protection activation – Activation of new protections, based on configurable parameters (performance impact, confidence index, threat severity). The difficulties of constant, individual management of thousands of protections are eliminated.
- Unified Management – The IPS blade is configured and managed through a common Check Point management interface—the same one used to manage other security gateway Software Blades and Check Point dedicated IPS.
- Configurable, actionable monitoring – Track events through detailed reports and logs of what is most important. The new Security Management Software Blade for IPS and Security Provisioning Software Blade simplify threat analysis and reduce operational overhead.
- Business-level views – Customizable reports provide easy monitoring of critical security events associated with your business-critical systems.
- Multi-dimensional sorting – Drag-and-drop columns of event data and the information will be automatically re-ordered.
- Actionable event logs – Edit the associated protection, create an exception or view packet data directly from log entries.
Check Point Next Generation Firewall (NGFW)…
- Identify, allow, block or limit usage of applications, and features within them
- Enable safe Internet use while protecting against threats and malware
- Leverage the world's largest application library with more than 6,600 web 2.0 applications
- Create granular policy definitions per user and group
- Integrate seamlessly with Active Directory
- Protect environments with social media and Internet applications
- Rely on 24/7 advanced protection
- Reap the benefits of application control and intrusion protection (IPS), as well as extensibility support for additional security capabilities
- Get greater understanding into security events with integrated, easy-to-use centralized management
- Join more than 170,000 customers, including 100 percent of Fortune 100 companies
- Querying the Active Directory
- Through a captive portal
- Installing a one-time, thin client-side agent
Check Point SandBlast…
Check Point SandBlast Agent provides purpose-built advanced Zero-Day Protection capabilities to protect web browsers and endpoints, leveraging Check Point’s industry leading network protections.SandBlast Agent ensures complete real-time coverage across threat vectors, letting your employees work safely no matter where they are without compromising on productivity. Threat Emulation capability emulates unknown files in contained environment to detect malicious behaviors and prevent infections while Threat Extraction provides sanitized risk-free files to the users instantly.
Anti-Ransomware protection stops ransomware in its tracks and reverses the damage automatically, ensures organizations are protected against malicious extortion attacks that encrypt business data and demand ransom payment for its retrieval. Zero Phishing proactively blocks access to new and unknown deceptive websites and safeguards user credentials by preventing the use of corporate passwords on external websites.
SandBlast Agent captures forensics data with continuous collection of all relevant system events, and then provides actionable incident analysis to quickly understand complete attack lifecycle. With visibility into the scope, damage, and attack vectors, incident response teams maximize productivity and minimize organizational exposure.
Features:
- Threat Emulation: Evasion resistant sandbox technology
- Threat Extraction: Delivers sanitized risk-free files to users in real-time
- Anti-ransomware: Prevents and remediates evasive ransomware attacks
- Zero-Phishing: Blocks deceptive phishing sites and alerts on password reuse
- Anti-Bot: Identify and isolate infected hosts
- Anti-Exploit: Protects applications against exploit based attacks
- Behavioral Guard: Detects and blocks malicious behaviors
- Endpoint Antivirus: Protects against known malware
- Forensics: Records and analyzes all endpoint events to provide actionable attack forensics reports
Benefits:
- Advanced threat protection and automated endpoint forensic analysis for all malware types
- Prevents and remediates evasive ransomware attacks
- Proactively blocks known, unknown and zero-day malware
- Provides instant actionable understanding of attacks
- Automatically remediates infections
- Protects users credentials
Check Point vSEC Virtual Edition…
Dell EMC Avamar…
Dell EMC Avamar enables fast, efficient backup and recovery through its integrated variable-length deduplication technology. Avamar is optimized for fast, daily full backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops.
By deduplicating data - identifying only unique daily changes - Avamar reduces backup storage by up to 30x and network bandwidth consumption by up to 99%. Data is always encrypted and compressed in-flight to meet security and compliance regulations. And with Dell EMC Data Domain Cloud Tier, you can natively tier backup data to the cloud for long-term retention.
Avamar is available standalone or as a component of Dell EMC Data Protection Suite, which offers you a complete suite of data protection software options.
Key features:
- Backup and recovery optimized for virtual environments
- Enables application-consistent recovery of enterprise applications
- Uses variable-length deduplication for high performance and lower cost
- Delivers simple, one-step image recovery
- Provides intuitive centralized management and encryption for data security
- Integrated with Dell EMC Data Domain systems for enhanced scalability
DELL EMC CLOUD FOR MICROSOFT AZURE STACK…
Dell EMC Connectrix Switches…
- DS-6505B: Up to 24 ports, 16Gbps max
- DS-6510B: Up to 48 ports, 16Gbps max
- DS-6520B: Up to 96 ports, 16Gbps max
- DS-6610B: Up to 24 ports, 32Gbps max
- DS-6620B: Up to 64 ports, 32Gbps max
- DS-6630B: Up to 128 ports, 32Gbps max
- MP-7800B: Up to 16 8Gbs ports and 6 GigE ports
- MP-7810B: Up to 12 32Gbs ports and six 1/10GbE SFP+ ports
- MP-7840B: Up to 24 16Gbs port plus 16 1/10 GigE and 2 40 GigE ports
- MDS-9132T: Up to 32 ports, 32Gbps max
- MDS-9148S: Up to 48 ports, 16Gbps max
- MDS-9396S: Up to 96 ports, 16Gbps max
- MDS-9148T: Up to 48 ports, 32Gbps max
- MDS-9396T: Up to 96 ports, 32Gbps max
- MDS-9250i: Up to 40 FC ports, 2 x 10 GigE ports, 8 FCoE ports and 16Gbps max
- CNX-S4048: Up to 54 ports, 48 10 GbE SFP capable ports and six 40 GbE QSFP capable ports
- Offers Fibre Channel connectivity of up to 32 gigabits per second and Gigabit Ethernet speeds up to 40 GbE
- Scales from 8 to 128 ports per system
- Uses redundant components and multipath deployment to ensure high availability and failover
- Monitors your storage networking environment automatically with resilient networking features
Dell EMC Data Protection Advisor (DPA)…
Dell EMC Data Protection Suite for Applications (DPS for Apps)…
- Dell EMC Data Protection Advisor
- Dell EMC Data Domain Boost for Enterprise Applications
- Dell EMC Enterprise Copy Data Management
Dell EMC Networker…
NetWorker delivers centralized backup and recovery operations for complete control of data protection across diverse computing and storage environments.
- Virtual and physical environments
- Critical business applications
- Storage area networks (SANs), network-attached storage (NAS), and direct-attached storage (DAS).
- Backup storage options including, tape drives and libraries, virtual tape libraries, disk arrays, deduplication storage systems, and object storage in the cloud.
NetWorker delivers enterprise-class performance and security to meet even the most demanding service level requirements.
Integration with advanced technologies such as array-based snapshots (both block and file) and the VMware vStorage APIs for Data Protection provides fast, efficient, and non-disruptive backup.
Superb performance includes:
- Deploy a vProxy in less than 5 minutes
- Protect thousands of virtual machines with a single server
- Protect thousands of virtual machines through a single vCenter
- Support for 256-bit AES encryption
- Secure lockbox control
- Enhanced user authentication
- Role based authorization
BENEFITS
CENTRALIZED MANAGEMENT
- Simplifies and automates backup and recovery operations
- Integration with DPC offers centralized alerting, reporting and search
- Management of Data Domain from within the NetWorker UI
- Enables long-term retention of backups to the cloud with Data Domain Cloud Tier
- Instant access and recovery of VMware Image backups
- Reduce infrastructure utilization and cost
- Cost effective backup to object storage in the cloud
- Simplified deployment in native cloud formats
- Flexible backup and recovery for Azure Stack
Dell EMC NFV Ready Bundle for VMware…
- Ease of ordering: The full bundle is orderable from Dell EMC. No need to purchase vCloud NFV Platform software separately.
- Choice: VMware vCloud NFV provides a choice of Virtual Infrastructure Manager, giving you the flexibility to deploy on OpenStack or using vCloud Director.
- Long lifecycle deployment: The solution includes long-life Intel® Xeon® processors which reduces your investment risk and protects your investment in the solution for the long-term.
- Seamless customer experience: Dell EMC provides a single point of contact for pre-sales and post-sales support for the entire solution and length of your deployment for peace of mind.
- World-class professional services: The solution includes Dell EMC professional services that spans consulting, deployment, and design support to guide your deployment needs.
- Customizable solution: The solution is prescriptive, but it can be customized to address each customer’s unique virtual network function (VNF) workload requirements.
Dell EMC PowerEdge 14th generation server…
- Increase application performance and response time – With 19X more Non-Volatile Memory Express (NVMe) low latency storage than the prior generation, Dell EMC leads the industry in driving industry standards in NVMe via Express Flash
- Get results from PowerEdge faster – One-click BIOS tuning enables quick-and-easy deployment of many processing-intensive workloads
- Access to the right data at the right time – With enhanced storage capacity and flexibility, customers can tailor their storage configurations to their application needs, this is especially critical in a software-defined-storage (SDS) environment
- Unify the server management experience and provide full data center monitoring – OpenManage Enterprise is a new virtualized enterprise system management console with application plug-ins, an easy-to-use interface and customizable reporting
- Speed troubleshooting and maximize server uptime – The enhanced iDRAC 9 provides up to 4 times better systems management performance over the prior generation
- Enable faster remediation - ProSupport Plus with SupportAssist can reduce time to resolve parts failure by up to 90%
- Improve power efficiency and compute density – Automatic multi-vector cooling enables more GPU accelerators in a single configuration, increasing up to 50% more VDI users per server
- Prevent unauthorized or inadvertent changes – System Lockdown, an industry-first feature, prevents configuration changes that create security vulnerabilities and expose sensitive data
- Secure data center through a cyber-resilient architecture – Features such as SecureBoot, BIOS Recovery capabilities, signed firmware and iDRAC RESTful API (compliant with Redfish standards) provide enhanced protection against attacks
- Ensure privacy – System Erase quickly and securely erases user data from drives or wipes all non-volatile media when a server is retired
- Improve airflow – A new streamlined front profile moves air efficiently, optimizing power for application performance
- Deliver an intuitive user experience – Server configuration and monitoring is now possible via a handheld smart device with Quick Sync feature
- Be eco-friendly – Introduction of hemmed edges as a structural element, eliminates the use of paint on the server reducing environmental impact
- Our IT Transformation Workshop, where Dell EMC consultants help customers compare their efforts to best-in-class peers and identify key priorities to accelerate their transformation to a modern, cloud-enabled infrastructure and IT model
- Award-winning ProDeploy Enterprise Suite accelerates technology adoption, saving time and money with up to 91% less IT effort and up to 39% faster deployments than in-house resources
- ProSupport Enterprise Suite, services which are fully integrated with the PowerEdge 14th generation server’s intelligent management and automation features, include ProSupport Plus with SupportAssist, Dell EMC’s automated, proactive and predictive technology that can resolve hardware issues up to 90% faster
Dell EMC PowerEdge MX I/O Modules…
- Plug and Play fabric deployment with simplified I/O Aggregation providing a single pane of glass view
- Physical topology validation and compliance checking
- Automated per-VLAN Quality of Service assignment based on traffic types
- Self-healing fabric detects misconfigurations and link failure conditions and adjusts where possible
- Fabric expansion capability using 25GbE connectivity across multiple chassis
- Single networking domain across the fabric providing a single pane of glass view
- SmartFabric Services provides a robust fabric-level automation framework
- Choice of unique Open Networking modular switches
- Choice of Dell EMC OS10 or select 3rd party OS’s
- Choice of leveraging standards-based open automation tools
- High-performance 25GbE and 32G FC connectivity within the chassis
- High throughput and low latency performance throughout the chassis
- Multi-rate 100GbE uplinks to data center leaf/spine fabric
Dell EMC PowerEdge Rack Servers…
New naming convention Since the introduction of the Generation 10 servers in 2007 Dell has adopted a standardized method for naming their servers; the name of each server is now represented by a letter followed by 3 digits. The letter indicates the type of server: R (for Rack-mountable) indicates a 19" rack-mountable server, M (for Modular) indicates a blade server, whilst T (for Tower) indicates a stand-alone server. This letter is then followed by 3 digits.
- The first digit refers to the number of sockets in the system: 1 to 3 for one socket, 4 to 7 for two sockets, and 8 or 9 for four sockets.
- The middle digit refers to the generation: 0 for Generation 10, 1 for Generation 11, and so on.
- The third digit indicates the make of the CPU: 0 for Intel or 5 for AMD.
Dell EMC PowerPath…
- Standardize Path Management: Optimize I/O paths in physical and virtual environments (PowerPath/VE) as well as cloud deployments.
- Optimize Load Balancing: Adjust I/O paths to dynamically rebalance your application environment for peak performance.
- Increase Performance: Leverage your investment in physical and virtual environment by increasing headroom and scalability.
- Automate Failover/Recovery: Define failover and recovery rules that route application requests to alternative resources in the event of component failures or user errors.
Dell EMC SourceOne…
Key offerings:
- Dell EMC SourceOne Email Management for Microsoft Exchange
- Dell EMC SourceOne Email Management for IBM Lotus Notes Domino
- Dell EMC SourceOne for File Systems
- Dell EMC SourceOne for Microsoft SharePoint
- Dell EMC SourceOne Discovery Manager
- Dell EMC SourceOne Email Supervisor
SourceOne helps to reduce the overall cost of data ownership in two ways. It reduces primary storage cost by archiving aged email and information content to the less costly storage tiers and reduces the costs associated with data and information discovery during legal and eDiscovery processes.
Take Control of PST Files
SourceOne provides users unlimited mailboxes and improves server performance by eliminating duplicated, scattered PST files. Properly managing PST files minimizes the chance of critical business data loss and organizational compliance failures.
Reduce Legal and Compliance Risks
When it comes to litigation readiness, speed and efficiency matter. SourceOne allows users to properly index and search relevant business data with ElasticSearch technology and web-version Discovery Manager for quick litigation and compliance readiness.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.