Aprima Medical Software, Inc
Carrollton, TX 75006
Share:
Gateway GPRS Support Node facilitates migration to 4G.
Based on Tellabs-® SmartCore(TM) 9100 Platform, Tellabs® Smart GGSN handles 4G-sized data flows in 3G networks, while enabling smooth migration from 3G to evolved, distributed 4G packet core. Support node also adds intelligence to optimize network control for mobile carriers. With Smart GGSN, carriers can prioritize critical traffic, gain real-time insights into what mobile Internet users are...
Read More »Managed Print Services include performance management.
With Oce MPS, organizations have single, accountable source for office document production, including copiers, printers, scanners, fax, and wide format printers. Services include dynamic assessment, pro-active maintenance, call center support, and print infrastructure management tools that provide remote monitoring, as well as automated fleet assessment. Continuous fleet performance monitoring...
Read More »Wireless Gateway, Router extend connectivity in harsh settings.
Used as primary WAN connection or as backup to landline connections, IndustrialPro(TM) Wireless Gateway and Router provide secure wireless connectivity to remote locations and assets. IndustrialPro Wireless Gateway offers one Ethernet port and one serial port, while IndustrialPro Wireless Router features one or 5 Ethernet ports, one serial port, as well as full firewall and routing functionality....
Read More »Gateway GPRS Support Node facilitates migration to 4G.
Based on TellabsÃ-® SmartCore(TM) 9100 Platform, Tellabsî Smart GGSN handles 4G-sized data flows in 3G networks, while enabling smooth migration from 3G to evolved, distributed 4G packet core. Support node also adds intelligence to optimize network control for mobile carriers. With Smart GGSN, carriers can prioritize critical traffic, gain real-time insights into what mobile Internet...
Read More »Managed Print Services include performance management.
With Oce MPS, organizations have single, accountable source for office document production, including copiers, printers, scanners, fax, and wide format printers. Services include dynamic assessment, pro-active maintenance, call center support, and print infrastructure management tools that provide remote monitoring, as well as automated fleet assessment. Continuous fleet performance monitoring...
Read More »Malware Analysis Software automates cyber-attack detection.
Sunbelt CWSandbox(TM) v3.0 enables users to analyze suspected files by executing code inside controlled and monitored environment. All malicious activity including system changes, network traffic, and memory dumps are recorded. Software uses Digital Behavior Traits (DBT(TM)) technology to interpret behavior of file, ad, document, or website to determine automatically if it is malicious....
Read More »Network Security Software protects against data leakage.
Data Loss Alarming in StealthWatch alerts organizations of potential data extrusions regardless of format, protocol, or encryption technique. Detecting anomalous data transfer from any point on network to Internet, scalable product identifies behavior indicative of data loss and offers details about users, amount of data transferred, services used, length of communications, and if event was...
Read More »Communications System integrates telephony capabilities.
Based on quad-core Intel Xeon 5500 processor, E-4000 R4 supports up to 96 GB DDR3 memory, 6 PCIe slots, and redundant hot-swap 800 W AC power supplies. Rack-mountable unit accommodates up to 5 telephony boards, providing capabilities for up to 20 T1/E1 digital network interfaces, 60 analog loop-start points, and 300 station tapped lines. System is suited for enterprise deployments such as voice...
Read More »Malware Analysis Software automates cyber-attack detection.
Sunbelt CWSandbox(TM) v3.0 enables users to analyze suspected files by executing code inside controlled and monitored environment. All malicious activity including system changes, network traffic, and memory dumps are recorded. Software uses Digital Behavior Traits (DBT(TM)) technology to interpret behavior of file, ad, document, or website to determine automatically if it is malicious....
Read More »Network Security Software protects against data leakage.
Data Loss Alarming in StealthWatch alerts organizations of potential data extrusions regardless of format, protocol, or encryption technique. Detecting anomalous data transfer from any point on network to Internet, scalable product identifies behavior indicative of data loss and offers details about users, amount of data transferred, services used, length of communications, and if event was...
Read More »