Produits

Home -> Produits

cryptzone-2

When users need to access the corporate network from untrusted computers AppGate MOVE provides a secure and trusted environment which executes from a USB flash drive. It does not use or rely on the hard drive or operating system of the host machine thus providing a truly zero footprint solution.

Working in combination with an AppGate Security Server, the USB flash drive is a bootable device containing a full operating system, the AppGate client, a web browser, an MS Office Suite™ and email client, and other applications for the daily work routine.

READ MORE

BYOD is becoming increasingly prevalent, as employees enjoy using familiar technology over corporate-mandated equipment. But since employees may own and possess the devices they're using to do corporate work, how can IT control the security and performance of corporate applications and assets? 

With employee-owned devices, it's a gray area on the amount of control IT has over the endpoint. Can they monitor it, or does monitoring violate employee privacy? Can they take actions to protect the device without employee permission?

Privacy rights of the employee are extremely sticky when dealing with BYOD.

When an employee-owned device is lost or stolen, does IT have the right to remote wipe the device? What about personal data the employee has on the device?

With BYOD, instead of IT worrying about one device per employee, a single employee might use 2, 3 or more devices to access corporate resources.

It should be assumed that BYOD endpoints are security risks, due to a lack of corporate control over the devices.

READ MORE

Proven Protection Against Targeted Attacks and Advanced Persistent Threats

The Trend Micro Deep Discovery threat protection platform enables you to detect, analyze, and respond to today’s stealthy, targeted attacks in real time. Deployed as individual components or as a complete cyber security platform, Deep Discovery provides advanced threat protection where it matters most to your organization. The Deep Discovery platform is the foundation of the Trend Micro Custom Defense, integrating your security infrastructure into a comprehensive defense tailored to protect your organization against targeted attacks.

Highest detection rates—thanks to specialized engines and custom sandboxing

In-depth analysis—with local and global threat intelligence correlation

Rapid response—using advanced endpoint forensics and shared IOC intelligence

READ MORE

Delivers unmatched performance and protection while simplifying your network.  Each FortiGate includes the widest range of security and networking functions on the market, including:

  • Firewall, VPN, and Traffic Shaping
  • Intrusion Prevention System (IPS)
  • Antivirus/Antispyware/Antimalware
  • Integrated Wireless Controller
  • Application Control
  • Data Loss Prevention (DLP)
  • Vulnerability Management
  • IPv6 Support
  • Web Filtering
  • Antispam
  • VoIP Support
  • Layer 2/3 Routing
  • WAN Optimization & Web Caching

READ MORE

The Hitachi NAS Platform, powered by BlueArc®, is an advanced and integrated network attached storage (NAS) solution. It is a powerful tool for file sharing as well as file server consolidation, data protection and business critical NAS workloads.

HNAS also uses world-class Hitachi Virtual Storage Platform (VSP) and Advanced Modular Storage (AMS) for either direct of SAN attached storage to provide high availability and enterprise-level reliability.

Hitachi NAS Platform 3200 systems (also known as BlueArc Titan 3200) are designed for customers who require performance and scalability for their most demanding revenue-generating, mission-critical applications.

HitachiNAS Platform 3080 and 3090 systems (also known as BlueArc Mercury 55 and 110) support customers with mid-range storage requirements who wish to reduce their total cost of ownership through consolidation without sacrificing performance and scalability.

Both platforms leverage BlueArc SiliconFS, our patented hardware accelerated object-based file system, and a full suite of intelligent management tools.

hitachi-platform-overview

 

READ MORE

Data security breaches can cost a company dearly in areas such as recovery efforts, brand erosion and customer churn, legal issues and IT infrastructure rebuild.

Storage is an element of a deep defensive strategy that enhances your ability to comply with laws and regulations. A resilient infrastructure from Hitachi Data Systems (HDS) help you improve data security and data protection with these capabilities:

  • Develop accountability at the storage layer with enhanced authentication, authorization and audit logging
  • Discover weak links through ongoing scans and analysis
  • Implement data protection:
    • Data availability through support for disaster recovery and business continuity replication that includes synchronous and asynchronous copies for local and remote storage
    • Data integrity via checksums, timestamps and read-after-write Serial-ATA
  • Enable data security:
    • Immutability by using WORM to make data non-erasable and non-rewritable for a prescribed period
    • Fingerprinting objects in Hitachi Content Platform active archive to ensure long-term immutability
    • Data sanitization controlled data destruction
    • Data confidentiality through encryption of data in-flight and at-rest, using external devices
    • Data encryption built into Hitachi Virtual Storage Platform (VSP) and Hitachi Universal Storage Platform® V and VM via encrypting backend directors (EBED) and into Hitachi Adaptable Modular Storage 2000 family via self-encrypting drives
  • Ensure safe multitenancy, logical partitioning and separation of control and data within the system architecture itself
  • Audit logs with syslog access
  • Use secure management interfaces based on SMI-S standards
READ MORE

Gartner defines the UTM market as multifunction network security products used by small or midsize businesses. Fortinet hits the coveted top right spot again in 2012.

Fortinet's solutions include all of the basic features seen as necessities of a UTM - Standard network stateful firewall functions, remote access and site-to-site virtual private network (VPN) support, Web security gateway functionality, and network IPS – as well as many more including all the core features of Next Generation Firewalls. 

READ MORE

Network Sentry

The Company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals. Through its SmartEdge Platform, Network Sentry seamlessly integrates with the leading Advanced Threat Detection solutions to correlate high-fidelity security alerts with a threat’s foothold. This unique correlation bridges the silos of security, network, and endpoint information to enable confident, automated threat containment before it has an adverse impact on the business.

Network Sentry/NAC was purpose-built to deliver Network Access Control (NAC). It dynamically leverages the continuously growing library of security commands and controls built into today’s switches, routers, wireless controllers and wireless access points to perform pre-connect risk assessments on every device attempting to connect to the network. Unlike alternative approaches that depend on 802.1x specific hardware, Network Sentry/NAC leverages the existing network infrastructure to manage up to 20,000 concurrent devices from a single physical or virtual appliance. A manager of managers ensures growth and provides scalability to secure larger scale networks. Setup wizards, seamless integration, and intuitive workflows make installation and configuration simple.

Network Sentry/RTR leverages its unique Live Inventory of Network Connections (LINC) to automatically correlate high fidelity security alerts from the leading firewall and Advanced Threat Detection solutions, including FireEye, Fortinet, and Palo Alto Networks, with detailed contextual information on compromised endpoints, users and applications. Once identified, Network Sentry/RTR triggers an automated response, based on the severity and business criticality of the incident, to contain compromised devices in real time. Network Sentry/RTR also provides detailed historical information on all network connections, giving security experts unprecedented forensics to help fully understand and investigate the threat’s methodology, lifecycle and scope.

The AppGate Security Server uses a different approach to security: protecting the IT assets, not the network perimeter. All users are treated the same regardless of their location, and access to individual systems is granted to authorized users on a needs-only basis. The result is secure, role based access control, a simpler network infrastructure, and much greater flexibility since it is as easy to share network resources with business partners, home workers and mobile users as with internal users.

Cryptzone delivers the functionality required for secure access control including encryption, strong authentication, context aware authorization, granular control of user permissions, full monitoring and logging through its AppGate platform.

READ MORE

Quantum is a leading expert in scale-out storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. Quantum and INSA can help you maximize the value of these assets to achieve your goals, from storing complex governmental data, working with surveillance video, or business from small to massive that are trying to streamline their operations.

Stay tuned for more exciting information on Quantum Products.

 

 

 READ MORE at quantum.com

Page 1 sur 2
Vous êtes ici : Home Produits