Firewalls

Data and Database Management Software

Appliances help boost IT security operations' effectiveness.

Designed for mid-sized organizations, ES-1260 and ES-3060 enVision® appliances provide integrated 3-in-1 log management solution for Security Information and Event Management. Integral enVision v4.0 platform facilitates compliance and also optimizes IT and network operations via automated collection, analysis, alerting, auditing, reporting, and storage of IT log data. Additionally, platform...

Read More »
Network Security Platform offers up to 8 GbE Ethernet ports.
Firewalls

Network Security Platform offers up to 8 GbE Ethernet ports.

Featuring onboard Intel® EP80579 integrated processor at 600 MHz or 1.2 GHz, 1U rackmount platform PL-8000 provides single channel DDRII SODIMM support up to 2 GB. It includes 3.5 in. SATA HDD and CompactFlash(TM), one PCIe x 4 expansion slot, and supports one segment of LAN bypass function. Front panel features USB 2.0 port, RJ-45 console port and LED indicators to monitor power and...

Read More »
Firewalls

Appliance captures botnet attack activity inside networks.

With little chance of false positives, Failsafe v3.0 provides real-time identification and protection against bot-driven attack activity inside enterprise networks. Multi-perspective analysis concentrates on communications between compromised systems and actual Command-and-Control nodes on Internet. Failsafe's Management Console gives users granular control over settings, reports, cloud...

Read More »
Network Security Appliance is fully Linux compatible.
Firewalls

Network Security Appliance is fully Linux compatible.

Employing Intel E080579 SOC processor and supporting DDRII socket memory up to 2 GB, Teak 3020 provides data security in LAN and WAN environments using ciphers, hash, and public key. It features SATA 2.5 HDD bay for data back up, along with mini PCI Express slot and integrates 4 Intel Gigabit LAN ports. Device suits SSL VPN network security control and network testing and emulations, and other...

Read More »
Security Systems

Network Devices fight cybercrime and data center attacks.

Based on OnDemand Switch platform, DefensePro products deliver network inspection speeds of over 12 Gbps. Customers gain real-time intrusion prevention system that protects data center assets against existing and emerging threats, including authentication defeat, information theft, and both low and high volume Denial of Service attacks. Delivering behavioral-based technology that automatically...

Read More »
Firewalls

Remote Access Appliance addresses SMB connectivity needs.

Designed to facilitate management and control for distributed workforce, SSL VPN 3.5 provides users with secure, clientless remote support and remote access to range of resources on corporate network. Support is provided for all Windows Mobile devices as well as IPv6 compatibility and application offloading. In addition to support for Windows OS, appliance offers remote access support for Mac OS...

Read More »
Firewalls

Security Appliances accommodate multi-Gigabit-speed networks.

Fidelis Extrusion Prevention System® (Fidelis XPS(TM)) Direct 2500 and Fidelis XPS Internal 2500 enable global enterprises to scale prevention capabilities to 10-gigabit-based networks for control of content anywhere it flows on internal or external networks. Both data leakage prevention (DLP) solutions leverage architecture of deep session inspection(TM) platform to help prevent leakage of...

Read More »
Firewalls

Appliance protects interactive web applications from attack.

Based on in-line technology, WebDefend(TM) v3.5 can be installed between web servers and Internet for active blocking of web application attacks, including SQL injections, email-harvesting robots, and file inclusion attacks. Using geo-location technology, appliance allows organizations to track locations of each event. Organizations can centrally manage information users see within management...

Read More »
Data and Database Management Software

Software audits and analyzes router/firewall configuration.

Firewall Risk Assessment provides corporate security managers with detailed report of threats to corporate security, ranking and prioritizing dangers to business critical assets based on system vulnerabilities. It also exposes complex firewall configurations leading to security risks hidden within firewall rules, and highlights duplicated, disabled, unused, or expired rules to increase...

Read More »
Internet Software

Software helps businesses control Internet usage.

Offering Windows Vista compatibility, IM Lock 2009 blocks Internet applications, Web-based IM communications, peer-to-peer (P2P) file sharing, streaming media, as well as objectional content. Designed to work with networks between 10 and 200 computers, software allows for administrator customization, including timed blocking, specific website blocking, and password protected enabling/disabling....

Read More »

All Topics