Connect with us

Enterprise Networks

Network Security

Brand

Models

Exclusive Features

Check Point Software Technologies

1400 Security Appliances

Ideal for small and branch office deployments; Delivering all-in-one advanced threat prevention with SandBlast Zero-Day Protection (sandboxing); Flexible network connectivity; and maximum port density – all in a compact, high-performance desktop form factor

3000 Security Appliances

For businesses requiring comprehensive threat prevention security without compromise, the Check Point 3000 appliances offer a multicore design and industry-leading performance in a compact form factor ideal for branch and small office deployments

5000 Security Appliances

Protecting modern enterprise networks requires a fully integrated, multi-layered solution tuned to deliver maximum security without impacting performance—including inspecting encrypted traffic

15000 Security Appliances

Designed for high performance, reliability, and uncompromising security to combat even the most sophisticated threats, making them ideal for enterprise and data center environments

Cisco

Router Security

Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats

Cisco VPN Internal Service Module for ISR G2

A compact, versatile high-performance VPN blade for the Cisco Integrated Services Routers Generation 2 (ISR G2). It provides up to three times better performance for IPsec VPN encrypted traffic

Cyberoam

Comprehensive Security from Layer 2 to Layer 8

Network security appliances, available as UTMs and next-generation firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. Cyberoam ensures high levels of network security, network connectivity, continuous availability, and secure remote access with controlled network access to road warriors, telecommuters, partners, and customers

Next-Generation Firewalls

Security Subscriptions-Cyberoam security features can be subscribed to, individually or as bundles, and are available as 1 year, 2 year, and 3 year subscriptions

Cyberoam NetGenie

Integrated Security Appliance for small offices – allows the Internet connection to be shared with office users over desktops, laptops, handheld devices like iPad, iPhone, and more – at the same time

Cloud Security and Services

Cyberoam’s on-Cloud Management-Offers a simple, cost-effective way for partners to manage hundreds of Cyberoam appliances for multiple customers from a single interface, anywhere, anytime

Unified Threat Management

Hardware appliances – offer comprehensive security to organizations, ranging from large enterprises to small and branch offices

Dell

SuperMassive E10000 Series

Deepen application control across your enterprise network

SuperMassive E9000 Series

Rely on a scalable, deep-security business firewall at multigigabit speeds

SonicWALL NSA Series

A single platform that integrates automated and dynamic security capabilities for outstanding next-generation firewall protection

SonicWALL TZ Series

Gives SMB customers enterprise grade protection that stops cybercriminals in their tracks

Wireless Network Security

SonicPoint Wireless Access Point Series-Dell SonicPoint Wireless access points use 802.11 wireless technology to provide high-speed wireless connectivity that is easy to set up and manage

Security and Analytics Management

SonicWALL Analyzer

Full visibility into your network infrastructure with comprehensive reports on bandwidth, threats, application traffic analysis, and more

SonicWALL Global Management System Series

Simplify and automate management, monitoring, and reporting for your Dell SonicWALL infrastructure with powerful and intuitive administration tools

WAN Acceleration

SonicWALL WXA Series – optimize existing bandwidth and help improve the end-user experience for increased productivity

NSA Series

Applying the same security engine and services as our SuperMassive series, Dell Network Security Appliance (NSA) next-gen firewalls boost performance and reduce costs and complexity for distributed enterprises, SMBs, branch offices, school campuses, and other public institutions

TZ Series

Stop security risks with the best UTM firewall for small businesses, retail deployments, distributed enterprises, remote sites, and branch offices

Forcepoint

Forcepoint Stonesoft Next-Generation Firewall

Optimize and scale network security for distributed enterprise with lower infrastructure costs and far less downtime

Fortinet

FortiGate Platform – High Performance Firewall, Next-Gen Firewall and UTM

Whether to deploy a high performance data center firewall, an enterprise next-generation firewall, or a smaller UTM device for Distributed Enterprise site or small business, there is a FortiGate physical or virtual appliance to fit every unique network security requirements; Combines FortiOS Operating System with custom FortiASIC processors and the latest-generation CPUs to provide advanced protection from sophisticated, highly targeted attacks, without becoming a network bottleneck

FortiSandBox – Advanced Threat Detection Appliances

FortiSandbox is an advanced threat protection detection designed to identify the highly targeted and tailored attacks that increasingly bypass traditional defenses and lurk within networks; Offering a unique dual-level Sandbox, inspection of all protocols and functions in one appliance and optional integration with existing FortiGate infrastructure, FortiSandbox delivers highly effective protection against this emerging class of threats that is affordable to buy as well as simple to deploy and manage

FortiDDoS – DDoS Attack Mitigation Appliances

The FortiDDoS family of purpose-built appliances provides real-time visibility into the networks in addition to detection and prevention of Distributed Denial of Service (DDoS) attacks; helps protect Internet-facing infrastructure from threats and service disruptions by surgically removing network and application-layer DDoS attacks, without becoming a network bottleneck

FortiWeb – Web Application Security

Protects web-based applications and Internet-facing data from attack and data loss; Using advanced techniques to provide bidirectional protection against malicious sources, application layer DoS attacks and sophisticated threats like SQL injection and Cross-site scripting

FortiMail – Email Security Appliances

A complete Email Security platform from Fortinet for any size organization; Provides a single solution to protect against inbound attacks, as well as outbound threats and data loss, with a wide range of security capabilities including antispam, antiphishing, antimalware, data leakage prevention, identity based encryption (IBE), message archiving, and antiblacklisting

FortiADC – Application Delivery Controller

The line of hardware and virtual application delivery controllers provide unmatched server load balancing performance whether you need to scale an application across a few servers in a single data center or serve multiple applications to millions of users around the globe. With included SSL Offloading, HTTP compression, global server load balancing, firewall and link load balancing, they offer the performance, features, and security you need at a single-all inclusive price

FortiGate SD-WAN

Fortinet is the only NGFW vendor to provide native SD-WAN along with integrated advanced threat protection.  FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.  It provides the industry’s best VPN performance and a scalable solution that can be deployed across several branches

FortiAuthenticator – User Identity Management

Provide Two-factor Authentication, RADIUS, LDAP, and 802.1X wireless authentication, certificate management and Fortinet single sign-on; Compatible with and complements the FortiToken range of two-factor authentication tokens for secure remote access enabling authentication with multiple FortiGate network security appliances and third-party devices; Together, FortiAuthenticator and FortiToken deliver cost effective, scalable secure authentication to your entire network infrastructure

FortiManager – Centralized Security Management

Allow one to centrally manage any number of Fortinet Network Security devices, from several to thousands, including FortiGate, FortiWiFi, and FortiCarrier; Network administrators can better control their network by logically grouping devices into administrative domains (ADOMs), efficiently applying policies and distributing content security/firmware updates

FortiAnalyzer – Centralized Log and Reporting

Securely aggregate log data from Fortinet Security Appliances. A comprehensive suite of easily customizable reports allows you to quickly analyze and visualize network threats, inefficiencies, and usage

FortiSIEM – Security Information and Event Management

An all-in-one platform that lets you rapidly find and fix security threats and manage compliance standards while reducing complexity, increasing critical application availability, and enhancing IT management efficiency

Mavenir

Signaling Firewall

SS7 signaling technology is used by a vast majority of mobile network operators and until recently it was practically impossible to obtain access via an unauthorized remote host. Now though, newer signaling transport protocols have been developed extending SS7 to run over IP. This inadvertently exposed the underlying signaling services to the public domain. The result is that an intruder with adequate technical skill can exploit mobile networks and their subscribers. Mavenir offers the industry’s most advanced Network Security and Fraud Management Suite, a unique platform built with AI/Machine Learning & Big Data Analytics providing Real-Time Network Protection and Fraud Prevention. The model for mobile network economics includes protecting revenues from continuous and growing security and fraud threats. To protect the mobile operator’s revenue, security solutions utilizing Artificial Intelligence/Machine Learning for Enhanced Messaging firewalls and A2P managed services are required. Mavenir’s Signaling Firewall supports, SS7, Diameter, SIP connectivities’ vulnerability

Segw

Mavenir’s optional Security Gateway (SeGW) within the solution sits between the wireless access networks and packet data core networks, providing security to the packet core network. It is especially useful when the wireless or access network is untrusted. It provides mobile operators with a complete Security Gateway solution. Mavenir’s SeGW use IKEv2, as specified in RFC 5996 and as profiled by 3GPP specifications 33.402 to establish the IPsec security associations

McAfee (Acquired by Intel)

Network Security Platform

Discover and block sophisticated threats in the network. Using a collection of advanced detection techniques, McAfee Network Security Platform (IPS) defends against never-before-seen attacks, while providing robust investigative workflows that help administrators minimize alert noise and find breaches quicker

Virtual Network Security Platform

Built as a virtual instance of our award-winning next-generation IPS, McAfee Virtual Network Security Platform is designed to uniquely discover and block sophisticated threats across virtual networks, securing data and increasing visibility in your private, public, and hybrid clouds

Advanced Threat Defense

Detect advanced targeted attacks and get actionable threat information. Unlike traditional sandboxes, McAfee Advanced Threat Defense broadens detection and exposes evasive threats. Tight integration between McAfee solutions—from network to endpoint—enables instant sharing of information across the environment, enhancing protection and investigation to correct and recover post-attack

Netmagic

Webcontrol

NTT Com-Netmagic’s Webcontrol-Cloud, powered by Bluecoat, is a cloud based service that protects against viruses, spyware,botnets and thousands of other advanced Internet-based threats

R&M

Locks and security on the physical layer

Complete security and easy to install products for cabling systems

Savitri Telecom Service

Spirent Avalanche application testing and enhanced HTTP Layer 4-7 testing

The Application Testing and Enhanced HTTP bundle are two features of Spirent Avalanche that are targeted specifically at Cloud and Web application testing—whether the end goal is to test a Web application, a Web service, a cloud application or a network device

Cyberflood Advanced Malware Applications and Security Test Solutions

Robust testing of security systems requires test equipment that can generate real malware payloads and emulate network traffic from already-infected systems. A variety of security systems are used to detect and prevent malware. These include: Firewalls and network intrusion prevention systems (IPS); Unified threat management (UTM) systems; Content filtering and data loss prevention systems; and In-line sandboxing and advanced AI based malware detection solutions

Spirent SecurityLabs

Service levels of managed security testing: Standard—Basic compliance level scan (OWASP Top 10,SANS 20, PCI (6.5, 6.6); Premium—All tests in Standard level with the addition of best practices

Sterlite Technologies

IP Log Management System (IPLMS)

One click solution for data audit, compliance, and analysis

Symantec

Secure Web Gateway

An advanced, cloud-delivered network security service that enforces consistent internet security and compliance policies for all users regardless of location or device

Teleosft Technologies

The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance.

The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance. Un-sampled flow based monitoring gives network analysts detailed and accurate information about each and every communication session, including the end point identities, the session start and end times and the volume of traffic transmitted. TCP session timing information allows detection of anomalies and classification of traffic. This gives complete traffic visibility for analysis, Network Performance Monitoring and Diagnostics (NPMD) and compliance.

In addition the Telesoft FlowProbe can identify Layer 7 protocols, and extract key information into flow records:

• HTTP flows are detected on any port and the host, uri, method and status fields which are extracted and included in the flow record.

• SSL flows have the server name extracted and included in the flow record.

• DNS flows are detected, and the CNAME and host addresses added to the flow record.

• BGP correlation of IP address to AS is added to the flow record.

The Probe does not affect the monitored traffic and typically connects to monitoring infrastructure such as packet brokers or taps. Flow records are exported for analysis and storage to the scalable Telesoft Data Analytics Capability (TDAC) collection, retention and analysis application or to another IPFIX/NetFlow compatible collector.

Automatic detection of tunnelled traffic (GRE,GTP, MPLS, IPinIP) and de-tunnelling gives visibility of encapsulated traffic found on national ISP and telco carrier networks, making the ultra high rate multi-100GbE FlowProbe ideal for large scale national network deployments, peering links or data centre backbone. When de-tunnelling is selected, the FlowProbe will create flow records for the individual flows within a tunnel (including all the layer 7 details), and also identify the outer tunnel that is carrying it giving another layer of visibility and protection.

The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance.

The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance. Un-sampled flow based monitoring gives network analysts detailed and accurate information about each and every communication session, including the end point identities, the session start and end times and the volume of traffic transmitted. TCP session timing information allows detection of anomalies and classification of traffic. This gives complete traffic visibility for analysis, Network Performance Monitoring and Diagnostics (NPMD) and compliance.

In addition the Telesoft FlowProbe can identify Layer 7 protocols, and extract key information into flow records:

• HTTP flows are detected on any port and the host, uri, method and status fields which are extracted and included in the flow record

• SSL flows have the server name extracted and included in the flow record

• DNS flows are detected, and the CNAME and host addresses added to the flow record.

• BGP correlation of IP address to AS is added to the flow record

The Probe does not affect the monitored traffic and typically connects to monitoring infrastructure such as packet brokers or taps. Flow records are exported for analysis and storage to the scalable Telesoft Data Analytics Capability (TDAC) collection, retention and analysis application or to another IPFIX/NetFlow compatible collector.

Automatic detection of tunnelled traffic (GRE,GTP, MPLS, IPinIP) and de-tunnelling gives visibility of encapsulated traffic found on national ISP and telco carrier networks, making the ultra high rate multi-100GbE FlowProbe ideal for large scale national network deployments, peering links or data centre backbone. When de-tunnelling is selected, the FlowProbe will create flow records for the individual flows within a tunnel (including all the layer 7 details), and also identify the outer tunnel that is carrying it giving another layer of visibility and protection.

Trend Micro

Deep Security

Delivers automated and highly scalable cloud security

Deep Discovery

Enables you to detect, analyze, and respond to today’s stealthy ransomware, and targeted attacks in real time

Smart Protection Suites

Better, simpler, more flexible endpoint security

OfficeScan

Provides modern threat protection for anti-malware, packer variants, device control, command and control (C&C) traffic, browser exploits, behavior monitoring, web threats, census-based control, and more

Endpoint Security Solutions

Micro endpoint security gives you the threat protection and data security you need to protect your users and your corporate information across every device and application

TippingPoint

The acquisition of TippingPoint positions Trend Micro as the go-to enterprise security provider of dynamic threat defense solutions spanning endpoints, network, data center, and the cloud

Click to comment

You must be logged in to post a comment Login

Leave a Reply

error: Content is protected !!