2020-05-07T13:26:57+00:00
- Cloud Security for Web & Email.
- Insider Threat Data Protection.
- Cloud App Security.
- Multilevel Security Compliance.
- Office 365™ Security.
- Forcepoint Email Security.
- Forcepoint Web Security.
- Forcepoint DLP.
- Forcepoint DLP Endpoint.
2020-05-07T10:34:50+00:00
- VMware industry-leading virtualization platform with intelligent operations management, purpose-built to get the best performance, availability and efficiency out of your environment.
- NSX embeds security functions right into the hypervisor. It delivers micro-segmentation and granular security to the individual workload.
- Applications and data can reside and be accessible anywhere, Because NSX abstracts networking from the underlying hardware and attaches networking and security policies to their associated workloads.
- NSX treats physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach. This automates networking operations and eliminates bottlenecks associated with hardware-based networks.
- SDDC Platform.
- vSphere with Operations Management.
- vSphere.
- NSX.
- vRealize Network Insight.
- vSAN.
- Site Recovery Manager.
- vSAN ReadyNode.
2020-05-07T12:59:04+00:00
- Veeam® enables Disaster Recovery-as-a-Service (DRaaS) as part of a comprehensive availability strategy, embracing investments made in your datacenter.
- Veeam® delivers enterprise scalability with solutions for Hyper-V backup and management of your physical and virtual environment.
- Together, Veeam® and VMware save time and money while reducing risk for your organization. Veeam provides full VMware vSphere 6.6 support.
- Availability for the Always-On Enterprise.
- Veeam Availability Platform.
- Veeam Backup for Microsoft Office 365.
- Disaster Recovery Orchestration.
- Veeam Availability Orchestrator.
- Veeam Availability Console.
2020-05-07T13:33:38+00:00
- Safeguarding each component of every banking app is an ever-expanding challenge in today’s mobile environment.
- VASCO’s unique and fully integrated security framework provides organizations with a single-platform that provides the flexibility to meet any level of online or application security, deployment scale or threat mitigation requirement.
- VASCO solutions go beyond traditional transaction signing technologies. We deliver advanced protection against sophisticated hacking attacks coupled with the highest level of customer convenience.
- Identity Management.
- Dual Factor Authentication.
- Mobile App Security.
- DIGIPASS for Apps.
- Behavioral Authentication.
- Fraud Management Platforms.
- IDENTIKEY Authentication Server.
- IDENTIKEY Risk Manager.
2020-05-07T14:01:36+00:00
- Artificial intelligence fused with critical endpoint technologies deliver the most complete endpoint security on the planet.
- Multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection is the lightest and the strongest endpoint protection on the market.
- Symantec Encryption includes full-disk and removable media encryption for endpoints, email encryption to secure sensitive communications, and file share encryption to protect files on shared network drives and in the cloud.
- Symantec Data Loss Prevention lets you discover, monitor, and protect your confidential information wherever it’s stored and however it’s used – on mobile devices, within your data centers, or in the cloud.
- Integrated security solutions to monitor and protect sensitive data against cyber threats for retail organizations.
- Unified security solutions, proprietary data and unparalleled cyber expertise, tailored to meet the needs of the cyber insurance industry.
- Security solutions to protect sensitive data from internal and external threats for financial services organizations.
- Cyber threat protection for information systems in public safety and privacy, health and human services, and criminal justice sectors.
- End Point Protection.
- Drive Encryption.
- Data Loss Prevention.
- Secure Web Gateway
- Web Application Firewall & Reverse Proxy
- Content & Malware Analysis
- Network Performance / WAN Optimization
- Cloud Application Security (CASB)
- Encrypted Traffic Management
- Network Forensics & Security Analytics
2020-05-07T13:18:49+00:00
- Sonus SBCs deliver a secure, reliable and consistent quality of experience solution for Lync/Skype for Business deployments.
- Sonus SBCs can serve as an enhanced gateway to support connectivity and conversion between Voice over Internet Protocol (VoIP) and Public Switched Telephone Network (PSTN).
- Sonus provides the seamless integration, security, flexibility and resiliency required to allow enterprises to migrate to an Office 365 hybrid solution at a pace that is comfortable for them.
- Sonus Cloud Link for Microsoft CCE.
- Session Border Controllers and Tenor Gateways.
- VoIP and IP Telephony Voice Infrastructure.
- SBC Optimized for Microsoft Lync and Skype for Business.
2020-05-07T10:31:02+00:00
- Network Management.
- Network and Cloud Monitoring.
- Systems Management.
- IT Secuirty.
- Network Performance Management.
- Network Configuration Management.
- App. Performance Monitoring.
- Log and Event Manager.
- Secure FTP Servers.
2020-05-07T13:02:33+00:00
- Empowers security managers to automatically turn vast amounts of data into contextual, actionable intelligence, and to establish a mature enterprise security management program. By combining powerful security analytics software with data integration, network modeling, automation and vulnerability and threat intelligence.
- Gives you immediate insight to your biggest risks and how to deal with them.
- Firewalls Assurance.
- Change Manager.
- Network Assurance.
2020-05-07T13:22:05+00:00
- Service-oriented monitoring and dashboarding solution that allows you to easily manage and control the vast amount of data stored in Microsoft System Center Operations Manager (SCOM).
- Transforms SCOM’s technical data into dashboards that are easy to use, access and understand by both IT and key business stakeholders.
- Live Maps for SCOM.
- Live Maps for Mobile.
- Integration with SCSM.
2020-05-07T10:31:17+00:00
- Helps you identify the holes that can be used during an attack and how to seal them before a breach happens. But it’s more than launching scans and finding vulnerabilities; it requires you to create processes around efficient remediation and to ensure that the most critical items are being fixed first.
- A pen testing tool or program is a must-have in any security program, providing you with a virtual map of your exposures and where to direct your resources.
- Nexpose for Vulnerability Management.
- Metasploit for Penetration Testing .