Enterprise Networks
Network Security
Brand
|
Models |
Exclusive Features |
Check Point Software Technologies |
1400 Security Appliances |
Ideal for small and branch office deployments; Delivering all-in-one advanced threat prevention with SandBlast Zero-Day Protection (sandboxing); Flexible network connectivity; and maximum port density – all in a compact, high-performance desktop form factor |
3000 Security Appliances |
For businesses requiring comprehensive threat prevention security without compromise, the Check Point 3000 appliances offer a multicore design and industry-leading performance in a compact form factor ideal for branch and small office deployments |
|
5000 Security Appliances |
Protecting modern enterprise networks requires a fully integrated, multi-layered solution tuned to deliver maximum security without impacting performance—including inspecting encrypted traffic |
|
15000 Security Appliances |
Designed for high performance, reliability, and uncompromising security to combat even the most sophisticated threats, making them ideal for enterprise and data center environments |
|
Cisco |
Router Security |
Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats |
Cisco VPN Internal Service Module for ISR G2 |
A compact, versatile high-performance VPN blade for the Cisco Integrated Services Routers Generation 2 (ISR G2). It provides up to three times better performance for IPsec VPN encrypted traffic |
|
Cyberoam |
Comprehensive Security from Layer 2 to Layer 8 |
Network security appliances, available as UTMs and next-generation firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. Cyberoam ensures high levels of network security, network connectivity, continuous availability, and secure remote access with controlled network access to road warriors, telecommuters, partners, and customers |
Next-Generation Firewalls |
Security Subscriptions-Cyberoam security features can be subscribed to, individually or as bundles, and are available as 1 year, 2 year, and 3 year subscriptions |
|
Cyberoam NetGenie |
Integrated Security Appliance for small offices – allows the Internet connection to be shared with office users over desktops, laptops, handheld devices like iPad, iPhone, and more – at the same time |
|
Cloud Security and Services |
Cyberoam’s on-Cloud Management-Offers a simple, cost-effective way for partners to manage hundreds of Cyberoam appliances for multiple customers from a single interface, anywhere, anytime |
|
Unified Threat Management |
Hardware appliances – offer comprehensive security to organizations, ranging from large enterprises to small and branch offices |
|
Dell |
SuperMassive E10000 Series |
Deepen application control across your enterprise network |
SuperMassive E9000 Series |
Rely on a scalable, deep-security business firewall at multigigabit speeds |
|
SonicWALL NSA Series |
A single platform that integrates automated and dynamic security capabilities for outstanding next-generation firewall protection |
|
SonicWALL TZ Series |
Gives SMB customers enterprise grade protection that stops cybercriminals in their tracks |
|
Wireless Network Security |
SonicPoint Wireless Access Point Series-Dell SonicPoint Wireless access points use 802.11 wireless technology to provide high-speed wireless connectivity that is easy to set up and manage |
|
Security and Analytics Management |
||
SonicWALL Analyzer |
Full visibility into your network infrastructure with comprehensive reports on bandwidth, threats, application traffic analysis, and more |
|
SonicWALL Global Management System Series |
Simplify and automate management, monitoring, and reporting for your Dell SonicWALL infrastructure with powerful and intuitive administration tools |
|
WAN Acceleration |
SonicWALL WXA Series – optimize existing bandwidth and help improve the end-user experience for increased productivity |
|
NSA Series |
Applying the same security engine and services as our SuperMassive series, Dell Network Security Appliance (NSA) next-gen firewalls boost performance and reduce costs and complexity for distributed enterprises, SMBs, branch offices, school campuses, and other public institutions |
|
TZ Series |
Stop security risks with the best UTM firewall for small businesses, retail deployments, distributed enterprises, remote sites, and branch offices |
|
Forcepoint |
Forcepoint Stonesoft Next-Generation Firewall |
Optimize and scale network security for distributed enterprise with lower infrastructure costs and far less downtime |
Fortinet |
FortiGate Platform – High Performance Firewall, Next-Gen Firewall and UTM |
Whether to deploy a high performance data center firewall, an enterprise next-generation firewall, or a smaller UTM device for Distributed Enterprise site or small business, there is a FortiGate physical or virtual appliance to fit every unique network security requirements; Combines FortiOS Operating System with custom FortiASIC processors and the latest-generation CPUs to provide advanced protection from sophisticated, highly targeted attacks, without becoming a network bottleneck |
FortiSandBox – Advanced Threat Detection Appliances |
FortiSandbox is an advanced threat protection detection designed to identify the highly targeted and tailored attacks that increasingly bypass traditional defenses and lurk within networks; Offering a unique dual-level Sandbox, inspection of all protocols and functions in one appliance and optional integration with existing FortiGate infrastructure, FortiSandbox delivers highly effective protection against this emerging class of threats that is affordable to buy as well as simple to deploy and manage |
|
FortiDDoS – DDoS Attack Mitigation Appliances |
The FortiDDoS family of purpose-built appliances provides real-time visibility into the networks in addition to detection and prevention of Distributed Denial of Service (DDoS) attacks; helps protect Internet-facing infrastructure from threats and service disruptions by surgically removing network and application-layer DDoS attacks, without becoming a network bottleneck |
|
FortiWeb – Web Application Security |
Protects web-based applications and Internet-facing data from attack and data loss; Using advanced techniques to provide bidirectional protection against malicious sources, application layer DoS attacks and sophisticated threats like SQL injection and Cross-site scripting |
|
FortiMail – Email Security Appliances |
A complete Email Security platform from Fortinet for any size organization; Provides a single solution to protect against inbound attacks, as well as outbound threats and data loss, with a wide range of security capabilities including antispam, antiphishing, antimalware, data leakage prevention, identity based encryption (IBE), message archiving, and antiblacklisting |
|
FortiADC – Application Delivery Controller |
The line of hardware and virtual application delivery controllers provide unmatched server load balancing performance whether you need to scale an application across a few servers in a single data center or serve multiple applications to millions of users around the globe. With included SSL Offloading, HTTP compression, global server load balancing, firewall and link load balancing, they offer the performance, features, and security you need at a single-all inclusive price |
|
FortiGate SD-WAN |
Fortinet is the only NGFW vendor to provide native SD-WAN along with integrated advanced threat protection. FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support. It provides the industry’s best VPN performance and a scalable solution that can be deployed across several branches |
|
FortiAuthenticator – User Identity Management |
Provide Two-factor Authentication, RADIUS, LDAP, and 802.1X wireless authentication, certificate management and Fortinet single sign-on; Compatible with and complements the FortiToken range of two-factor authentication tokens for secure remote access enabling authentication with multiple FortiGate network security appliances and third-party devices; Together, FortiAuthenticator and FortiToken deliver cost effective, scalable secure authentication to your entire network infrastructure |
|
FortiManager – Centralized Security Management |
Allow one to centrally manage any number of Fortinet Network Security devices, from several to thousands, including FortiGate, FortiWiFi, and FortiCarrier; Network administrators can better control their network by logically grouping devices into administrative domains (ADOMs), efficiently applying policies and distributing content security/firmware updates |
|
FortiAnalyzer – Centralized Log and Reporting |
Securely aggregate log data from Fortinet Security Appliances. A comprehensive suite of easily customizable reports allows you to quickly analyze and visualize network threats, inefficiencies, and usage |
|
FortiSIEM – Security Information and Event Management |
An all-in-one platform that lets you rapidly find and fix security threats and manage compliance standards while reducing complexity, increasing critical application availability, and enhancing IT management efficiency |
|
Mavenir |
Signaling Firewall |
SS7 signaling technology is used by a vast majority of mobile network operators and until recently it was practically impossible to obtain access via an unauthorized remote host. Now though, newer signaling transport protocols have been developed extending SS7 to run over IP. This inadvertently exposed the underlying signaling services to the public domain. The result is that an intruder with adequate technical skill can exploit mobile networks and their subscribers. Mavenir offers the industry’s most advanced Network Security and Fraud Management Suite, a unique platform built with AI/Machine Learning & Big Data Analytics providing Real-Time Network Protection and Fraud Prevention. The model for mobile network economics includes protecting revenues from continuous and growing security and fraud threats. To protect the mobile operator’s revenue, security solutions utilizing Artificial Intelligence/Machine Learning for Enhanced Messaging firewalls and A2P managed services are required. Mavenir’s Signaling Firewall supports, SS7, Diameter, SIP connectivities’ vulnerability |
Segw |
Mavenir’s optional Security Gateway (SeGW) within the solution sits between the wireless access networks and packet data core networks, providing security to the packet core network. It is especially useful when the wireless or access network is untrusted. It provides mobile operators with a complete Security Gateway solution. Mavenir’s SeGW use IKEv2, as specified in RFC 5996 and as profiled by 3GPP specifications 33.402 to establish the IPsec security associations |
|
McAfee (Acquired by Intel) |
Network Security Platform |
Discover and block sophisticated threats in the network. Using a collection of advanced detection techniques, McAfee Network Security Platform (IPS) defends against never-before-seen attacks, while providing robust investigative workflows that help administrators minimize alert noise and find breaches quicker |
Virtual Network Security Platform |
Built as a virtual instance of our award-winning next-generation IPS, McAfee Virtual Network Security Platform is designed to uniquely discover and block sophisticated threats across virtual networks, securing data and increasing visibility in your private, public, and hybrid clouds |
|
Advanced Threat Defense |
Detect advanced targeted attacks and get actionable threat information. Unlike traditional sandboxes, McAfee Advanced Threat Defense broadens detection and exposes evasive threats. Tight integration between McAfee solutions—from network to endpoint—enables instant sharing of information across the environment, enhancing protection and investigation to correct and recover post-attack |
|
Netmagic |
Webcontrol |
NTT Com-Netmagic’s Webcontrol-Cloud, powered by Bluecoat, is a cloud based service that protects against viruses, spyware,botnets and thousands of other advanced Internet-based threats |
R&M |
Locks and security on the physical layer |
Complete security and easy to install products for cabling systems |
Savitri Telecom Service |
Spirent Avalanche application testing and enhanced HTTP Layer 4-7 testing |
The Application Testing and Enhanced HTTP bundle are two features of Spirent Avalanche that are targeted specifically at Cloud and Web application testing—whether the end goal is to test a Web application, a Web service, a cloud application or a network device |
Cyberflood Advanced Malware Applications and Security Test Solutions |
Robust testing of security systems requires test equipment that can generate real malware payloads and emulate network traffic from already-infected systems. A variety of security systems are used to detect and prevent malware. These include: Firewalls and network intrusion prevention systems (IPS); Unified threat management (UTM) systems; Content filtering and data loss prevention systems; and In-line sandboxing and advanced AI based malware detection solutions |
|
Spirent SecurityLabs |
Service levels of managed security testing: Standard—Basic compliance level scan (OWASP Top 10,SANS 20, PCI (6.5, 6.6); Premium—All tests in Standard level with the addition of best practices |
|
Sterlite Technologies |
IP Log Management System (IPLMS) |
One click solution for data audit, compliance, and analysis |
Symantec |
Secure Web Gateway |
An advanced, cloud-delivered network security service that enforces consistent internet security and compliance policies for all users regardless of location or device |
Teleosft Technologies |
The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance. |
|
The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance. Un-sampled flow based monitoring gives network analysts detailed and accurate information about each and every communication session, including the end point identities, the session start and end times and the volume of traffic transmitted. TCP session timing information allows detection of anomalies and classification of traffic. This gives complete traffic visibility for analysis, Network Performance Monitoring and Diagnostics (NPMD) and compliance. |
||
|
In addition the Telesoft FlowProbe can identify Layer 7 protocols, and extract key information into flow records: • HTTP flows are detected on any port and the host, uri, method and status fields which are extracted and included in the flow record. • SSL flows have the server name extracted and included in the flow record. • DNS flows are detected, and the CNAME and host addresses added to the flow record. • BGP correlation of IP address to AS is added to the flow record. The Probe does not affect the monitored traffic and typically connects to monitoring infrastructure such as packet brokers or taps. Flow records are exported for analysis and storage to the scalable Telesoft Data Analytics Capability (TDAC) collection, retention and analysis application or to another IPFIX/NetFlow compatible collector. Automatic detection of tunnelled traffic (GRE,GTP, MPLS, IPinIP) and de-tunnelling gives visibility of encapsulated traffic found on national ISP and telco carrier networks, making the ultra high rate multi-100GbE FlowProbe ideal for large scale national network deployments, peering links or data centre backbone. When de-tunnelling is selected, the FlowProbe will create flow records for the individual flows within a tunnel (including all the layer 7 details), and also identify the outer tunnel that is carrying it giving another layer of visibility and protection. The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance. The Telesoft FlowProbe provides detailed un-sampled traffic statistics in the form of flow records from large scale networks up to 4 x 100GbE per high performance 1U appliance. Un-sampled flow based monitoring gives network analysts detailed and accurate information about each and every communication session, including the end point identities, the session start and end times and the volume of traffic transmitted. TCP session timing information allows detection of anomalies and classification of traffic. This gives complete traffic visibility for analysis, Network Performance Monitoring and Diagnostics (NPMD) and compliance. In addition the Telesoft FlowProbe can identify Layer 7 protocols, and extract key information into flow records: • HTTP flows are detected on any port and the host, uri, method and status fields which are extracted and included in the flow record • SSL flows have the server name extracted and included in the flow record • DNS flows are detected, and the CNAME and host addresses added to the flow record. • BGP correlation of IP address to AS is added to the flow record The Probe does not affect the monitored traffic and typically connects to monitoring infrastructure such as packet brokers or taps. Flow records are exported for analysis and storage to the scalable Telesoft Data Analytics Capability (TDAC) collection, retention and analysis application or to another IPFIX/NetFlow compatible collector. Automatic detection of tunnelled traffic (GRE,GTP, MPLS, IPinIP) and de-tunnelling gives visibility of encapsulated traffic found on national ISP and telco carrier networks, making the ultra high rate multi-100GbE FlowProbe ideal for large scale national network deployments, peering links or data centre backbone. When de-tunnelling is selected, the FlowProbe will create flow records for the individual flows within a tunnel (including all the layer 7 details), and also identify the outer tunnel that is carrying it giving another layer of visibility and protection. |
|
Trend Micro |
Deep Security |
Delivers automated and highly scalable cloud security |
Deep Discovery |
Enables you to detect, analyze, and respond to today’s stealthy ransomware, and targeted attacks in real time |
|
Smart Protection Suites |
Better, simpler, more flexible endpoint security |
|
OfficeScan |
Provides modern threat protection for anti-malware, packer variants, device control, command and control (C&C) traffic, browser exploits, behavior monitoring, web threats, census-based control, and more |
|
Endpoint Security Solutions |
Micro endpoint security gives you the threat protection and data security you need to protect your users and your corporate information across every device and application |
|
TippingPoint |
The acquisition of TippingPoint positions Trend Micro as the go-to enterprise security provider of dynamic threat defense solutions spanning endpoints, network, data center, and the cloud |
You must be logged in to post a comment Login