View

Sorting

Products found: 13

logo
Offer a reference bonus
1.00

Allot Communications Secure Service Gateway

Protect network uptime and efficiency Allot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of the world’s largest network operators. Flexible redundancy configurations plus passive bypass with automatic port failover maximize uptime and availability. Automate operations and lower TCO Allot Secure Service Gateway integrates multiple functions in an Intel-based platform that protects your investment and lets you scale from 2 to 22 ports of 1GE/10GE network connectivity in a single appliance. Get the visibility you need to control application performance Allot provides live traffic monitoring and usage reporting according to traffic policies that are mapped to your complex data center and cloud applications, giving you full visibility and control of application performance, web access, user quality of experience, shadow IT and web threats. Protect users from Internet threats and enforce acceptable use Allot helps you embrace and maximize the business value of cloud (web) applications by detecting and blocking malware, phishing and other web threats before they harm application performance and user productivity. Allot Secure Service Gateway also detects and surgically filters DDoS and bot traffic before it affects your network. With Allot Secure Service Gateway you can:
  • See how well your mission-critical applications are performing and supporting user productivity
  • Control application performance and improve Quality of Experience according to business priorities
  • Keep malicious or unauthorized user/application traffic off your network
  • Neutralize threats and ensure ongoing performance of business applications
  • Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage
  • Troubleshoot and resolve network issues in real time
  • Simplify and automate your operations
  • Reduce opex and TCO
... Learn more
-
-
ROI-
-
6
0
logo
Offer a reference bonus
2.50

Amazon (AWS) решение для улучшения производительности

Решение проблемы низкойпроизводительности с помощью сервисов AWS Домен размещается в Amazon Route 53. Это высокодоступный и масштабируемый облачный веб-сервис системы доменных имен (DNS). Используется система анти DDoS AWS Shield. Этот сервис, совместно с Amazon Route 53 обеспечивает комплексную защиту от всех известных инфраструктурных атак (уровень 3 и 4). Виртуальный сервер EC2 типа C4, оптимизированный для нагрузок, требующих больших вычислительных мощностей. Необходима настройка auto scaling ресурсов и балансировка входящей на сервер нагрузки. В случае каких-либо пиковых нагрузок, вычисительные ресурсы автоматически масштабируются, что позволяет выдержать практически любую нагрузку. С целью повышения надежности и отказоустойчивости, а также уменьшения затрат на администрирование - выделение аппаратного обеспечения, настройка базы данных, установка исправлений и резервное копирование, для размещения базы данных - Amazon Relational Database Service.  Для повышения скорости работы сайта используется ElastiCashe - веб-сервис, упрощающий развертывание и масштабирование в облаке хранилища или кэша в памяти, а также управление ими. Настройка расширенного мониторинга приложения и базы данных осуществляется с помощью AWS CloudWatch. Путем создания различных правил, администратор сразу же получает sms уведомление на мобильный и на e-mail в случае возникновения непредвиденной ситуации. Для отправки сообщений CloudWatch интегрируется с сервисом AWS SNS (simple nitification service). Помимо отправки сообщений, при определенных обстоятельствах срабатывают тригеры, которые вызывают различные функции автоматизации, реализованные с помощью AWS Lambda.   Автоматически по расписанию создаются и сохраняются на AWS S3 бекапы базы данных и сервера приложений.  Используется диск с повышенной пропускной способностью Provisioned IOPS. На каждый инстанс БД может быть выделено до 40 000 IOPS.  Решение обеспечивает очень высокую производительность при низкой стоимости и одновременной автоматизации трудоемких задач администрирования. 
... Learn more
ROI-
-
3
6
logo
Offer a reference bonus
2.00

Amazon Elastic Block Store

Amazon Elastic Block Store (Amazon EBS) provides persistent block storage volumes for use with Amazon EC2 instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its Availability Zone to protect you from component failure, offering high availability and durability. Amazon EBS volumes offer the consistent and low-latency performance needed to run your workloads. With Amazon EBS, you can scale your usage up or down within minutes – all while paying a low price for only what you provision. Amazon EBS is designed for application workloads that benefit from fine tuning for performance, cost and capacity. Typical use cases include Big Data analytics engines (like the Hadoop/HDFS ecosystem and Amazon EMR clusters), relational and NoSQL databases (like Microsoft SQL Server and MySQL or Cassandra and MongoDB), stream and log processing applications (like Kafka and Splunk), and data warehousing applications (like Vertica and Teradata). Amazon EBS Features Persistent block storage for Amazon EC2 delivering capabilities and performance for the most demanding applications High Performance Volumes Choose between SSD-backed or HDD-backed volumes that can deliver the performance you need for your most demanding applications. Availability Each Amazon EBS volume is designed for 99.999% availability and automatically replicates within its Availability Zone to protect your applications from component failure. Encryption Amazon EBS encryption provides seamless support for data-at-rest and data-in-transit between EC2 instances and EBS volumes. Access Management Amazon’s flexible access control policies allow you to specify who can access which EBS volumes ensuring secure access to your data. Snapshots Protect your data by creating point-in-time snapshots of EBS volumes, which are backed up to Amazon S3 for long-term durability. Elastic Volumes Dynamically increase capacity, tune performance, and change the type of live EBS volumes.  Amazon EBS Benefits Highly available, high performance, persistent block storage for Amazon EC2. Reliable, Secure Storage Each Amazon EBS volume provides redundancies within its Availability Zone to protect against failures. Encryption and access control policies deliver a strong defense-in-depth security strategy for your data. Consistent, Low-latency Performance Amazon EBS General Purpose (SSD) volumes and Amazon EBS Provisioned IOPS (SSD) volumes deliver low-latency through SSD technology and consistent I/O performance scaled to the needs of your application. Backup, Restore, Innovate Protect your data by taking point-in-time snapshots of your Amazon EBS volumes providing long-term durability for your data. Boost the agility of your business by using Amazon EBS snapshots to create new EC2 instances. Quickly Scale Up, Easily Scale Down Amazon EBS allows you to optimize your volumes for capacity, performance, or cost giving you the ability to dynamically adapt to the changing needs of your business. Geographic Flexibility Amazon EBS provides the ability to copy snapshots across AWS regions, enabling geographical expansion, data center migration, and disaster recovery providing flexibility and protecting for your business. Optimized Performance An Amazon EBS–optimized instance provides dedicated network capacity for Amazon EBS volumes. This provides the best performance for your EBS volumes by minimizing network contention between EBS and your instance.
... Learn more
-
ROI-
-
10
10
logo
Offer a reference bonus
2.00

Amazon ElastiCache

Amazon ElastiCache offers fully managed Redis and Memcached. Seamlessly deploy, operate, and scale popular open source compatible in-memory data stores. Build data-intensive apps or improve the performance of your existing apps by retrieving data from high throughput and low latency in-memory data stores. Amazon ElastiCache is a popular choice for Gaming, Ad-Tech, Financial Services, Healthcare, and IoT apps. Benefits EXTREME PERFORMANCE Amazon ElastiCache works as an in-memory data store and cache to support the most demanding applications requiring sub-millisecond response times. By utilizing an end-to-end optimized stack running on customer dedicated nodes, Amazon ElastiCache provides secure, blazing fast performance. FULLY MANAGED You no longer need to perform management tasks such as hardware provisioning, software patching, setup, configuration, monitoring, failure recovery, and backups. ElastiCache continuously monitors your clusters to keep your workloads up and running so that you can focus on higher value application development. SCALABLE Amazon ElastiCache can scale-out, scale-in, and scale-up to meet fluctuating application demands.  Write and memory scaling is supported with sharding. Replicas provide read scaling.
... Learn more
-
ROI-
-
11
17
logo
Offer a reference bonus
2.00

Amazon Lambda function

AWS Lambda is a compute service that lets you run code without provisioning or managing servers. AWS Lambda executes your code only when needed and scales automatically, from a few requests per day to thousands per second. You pay only for the compute time you consume - there is no charge when your code is not running. With AWS Lambda, you can run code for virtually any type of application or backend service - all with zero administration. AWS Lambda runs your code on a high-availability compute infrastructure and performs all of the administration of the compute resources, including server and operating system maintenance, capacity provisioning and automatic scaling, code monitoring and logging. All you need to do is supply your code in one of the languages that AWS Lambda supports (currently Node.js, Java, C# and Python). You can use AWS Lambda to run your code in response to events, such as changes to data in an Amazon S3 bucket or an Amazon DynamoDB table; to run your code in response to HTTP requests using Amazon API Gateway; or invoke your code using API calls made using AWS SDKs. With these capabilities, you can use Lambda to easily build data processing triggers for AWS services like Amazon S3 and Amazon DynamoDB process streaming data stored in Kinesis, or create your own back end that operates at AWS scale, performance, and security.
... Learn more
-
ROI-
-
19
7
logo
Offer a reference bonus
1.00

Flowmon APM

APPLICATION PERFORMANCE MANAGEMENT FOR IT OPERATIONS Application Performance Tool With Flowmon APM you can start transparent application monitoring in a matter of minutes. Understand how every application behaves to every user in real-time with analysis of application protocols and communication between application and database servers. Flowmon APM automatically identifies performance problems, reveals root causes and provides IT operations with deep-insight diagnostics to drive user experience and application value. For all the users, for all the transactions for your business. See target applications. Is your critical web application running smoothly? What if your customers face a slow response of your business application? What if you do not even know that your employees are struggling with errors when working with internal systems? How promptly do you detect an error and the root cause? Flowmon Application Performance Monitor (APM) solution proactively monitors your business critical applications from the end user perspective so you always know how they stack up. With no agents on servers, no changes in configuration. FLOWMON APM DELIVERS TO IT OPERATIONS Agentless solution for transparent application monitoring. Flowmon APM does not affect infrastructure or applications in any way. Ultimate end-to-end Tool. Manage application delivery chain from end to end. Distinguish between network/application/database issues and optimize user experience. Installation in 3 steps for quick time-to-value. The setup process allows the user to have running application monitoring in a matter of minutes. A pre-configured set of tools and reports provide immediate understanding of application behavior. Hard data for capacity planning and infrastructure upgrade. Get a real insight into infrastructure utilization to optimize and plan capacity. Ease of use via intuitive GUI and priceless APM Index. APM Index expresses application performance in terms of SLA and helps to resolve problems with no unnecessary delays. Find out more in Flowmon APM Product Brief. Reduction of costs and time spent on troubleshooting. Flowmon APM provides a comprehensive set of tools for effective troubleshooting, cutting down the time needed to investigate the source of application problems. IMPROVE CUSTOMER SATISFACTION AND EMPLOYEE PRODUCTIVITY
  • Monitor applications based on HTTP/HTTPS protocols
  • Database application monitoring
  • Troubleshoot application performance issues
  • Enhance customer and internal user satisfaction
  • Measure and report service level agreements (SLA), declare QoS
  • Receive hard data for infrastructure upgrade
... Learn more
-
-
ROI-
-
16
12
logo
Offer a reference bonus
1.00

ForeScout CounterACT

CounterACT agentless technology discovers, classifies and assesses devices. CounterACT interrogates the network infrastructure to discover devices as they connect to the network. Our customers have reported seeing up to 60% more devices on their network than previously known. After discovering a device, CounterACT uses a combination of passive and active methods to classify the device according to its type and ownership. Based on its classification, CounterACT then assesses the device security posture and allows organizations to set policies that establish the specific behavior the device is allowed to have while connected to a network. At ForeScout, we don’t believe in artificial barriers that limit your options and force vendor lock-in. CounterACT works with leading network infrastructure, third-party security and IT management solutions. It also offers flexible deployment and configuration options to match your company’s specific needs. Choose physical or virtual deployments or both, and centrally manage them with CounterACT Enterprise Manager. Several features set CounterACT apart:
  • Agentless: No endpoint agents are required for authentication and network access control, allowing CounterACT to see and control managed, unmanaged and IoT devices.
  • Open interoperability: CounterACT works with popular switches, routers, VPNs, firewalls, endpoint operating systems (Windows®, Linux, iOS®, OS X and Android), patch management systems, antivirus systems, directories and ticketing systems—without infrastructure changes or upgrades.
  • Security orchestration: Optional modules orchestrate information sharing and policy-based security enforcement between CounterACT and leading IT and security management products.
  • 802.1X authentication, or not: Choose 802.1X or other authentication technologies such as LDAP, Active Directory®, RADIUS®, Oracle® and Sun. Hybrid mode lets you use multiple technologies concurrently.

... Learn more
-
-
ROI-
-
8
18
logo
Offer a reference bonus
1.00

Ixia IxLoad

Measure the quality of experience of real-time, business-critical applications with converged multiplay service emulations. PROBLEM: ENDANGERED QUALITY OF EXPERIENCE In today’s highly competitive landscape, organizations must meet stringent network quality requirements to deliver the best customer experience. However, a widening array of multimedia applications, and an increasing number of users, is making it harder—and more expensive—than ever to validate converged multiplay services and application delivery platforms. Without a way to properly test these services, customer quality of experience is at risk. SOLUTION: A HIGHLY SCALABLE AND EASY-TO-USE SOLUTION FOR TESTING AND VALIDATION IxLoad delivers comprehensive performance testing for validating user quality of experience. IxLoad works by emulating web, video, voice, storage, VPN, wireless, infrastructure, and encapsulation/security protocols to create realistic scenarios. A modular system design allows IxLoad to scale with your infrastructure while real-time quality of experience metrics let you drill down to quickly identify network degradations and isolate breaking points. Since IxLoad is as easy to use as it is effective, you don’t have to be a protocol expert to achieve complete end-to-end service validation. KEY FEATURES
  • Offers the industry’s highest HTTP, SSL, and IPsec performance and scale
  • Delivers end-to-end testing of converged wireless and wired application delivery infrastructure and services
  • Provides real-time insight into QoE
  • Emulates fully integrated broadband network infrastructures with application traffic testing
  • Serves as the only test solution in the market that can model the dynamic nature of user behavior
  • Achieves seamless application performance validation across physical and virtual networks 
  • Emulates a blend of real-world application traffic used on today’s networks (AppLibrary)
... Learn more
-
-
ROI-
-
13
19
logo
Offer a reference bonus
1.00

Ixia IxNETWORK

IxNetwork is a comprehensive network infrastructure performance testing solution. It scales to handle most powerful devices and largest networks, from routing and switching to data center ethernet and software defined networking. PROBLEM: NETWORK COMPLEXITIES PUT PERFORMANCE TO THE TEST Organizations have long tested their networks for scale and performance. But as networks become increasingly complex, so do the challenges of ensuring peak network performance and resiliency. Forget about simply testing for sluggish response times: The right testing tool must now assess complex network topologies with thousands of network devices, emulate sophisticated traffic flows, and conduct stress tests under countless scenarios and network conditions. SOLUTION: A RELIABLE TEST SYSTEM FOR COMPLEX AND UNPREDICTABLE NETWORKS IxNetwork delivers performance testing under the most challenging conditions. Capable of generating multiple terabytes of data and analyzing up to 4 million traffic flows simultaneously, IxNetwork scales to handle the most powerful devices and the largest networks. With its enhanced real-time analysis and statistics, this powerful solution emulates everything from routing and switching, Data Center Ethernet and Software Defined Networking to Broadband Access and Industrial Ethernet for comprehensive testing. And graphical user interface (GUI) wizards make it easier for IT teams to meet a wide range of performance requirements with minimal resources. KEY FEATURES
  • Offers test coverage from 1G to 400G Ethernet
  • Provides comprehensive protocol coverage for routing/switching, multiprotocol label switching (MPLS), broadband access, industrial Ethernet (IE), data center networking, and software-defined networking (SDN)
  • Generates traffic flows that mimic realistic user applications and scenarios
  • Works smoothly in virtualized network environments, and runs from any commercially available compute environment
  • Delivers end-to-end test system automation
  • Performs rapid isolation of service violations, including thorough traffic-flow analysis
  • Emulates a blend of real-world application traffic used on today’s networks 
... Learn more
-
-
ROI-
-
13
7
logo
Offer a reference bonus
2.70

Microsoft System Center Configuration Manager (SCCM)

SCCM components include Policy Infrastructure Service Window Manager CCM Scheduler State System CCM CI SDK DCM Agent DCM Reporting CI Agent MTC CI Store CI Downloader CI Task Manager CI State Store Content In[fra]structure Software Distribution Reporting
... Learn more
ROI-
-
13
9
logo
Offer a reference bonus
1.00

Netwrix Auditor

Detect data security risks and anomalous user behavior before they result in a data breach. Pass compliance audits: PCI DSS, HIPAA, SOX, FISMA, ISO 27001, GLBA, FERPA, NERC and others. Increase the productivity of IT security and operations teams with actionable, ready-to-use intelligence. Assess and Mitigate IT Security Risks Get a bird’s-eye view of your security posture with interactive risk assessment dashboards. Quickly identify your biggest security gaps and use the actionable intelligence to minimize the ability of intruders and insiders to cause damage. Respond immediately to threats Use alerts to be notified about unauthorized activity as it happens so you can prevent security breaches. For example, you can choose to be notified whenever someone is added to the Enterprise Admins group or a user modifies many files in a short period of time, which could indicate a ransomware attack. Identify potential threat actors Improve detection of rogue insiders and accounts compromised by external attackers with an aggregated view of all anomalous activity in your environment. Use the associated risk scores to prioritize the threats and deal with the most dangerous actors first. Investigate anomalies in user behavior Whenever you detect a suspicious event or chain of events, use our interactive Google-like search to investigate how it happened, so you determine the best response and take steps to prevent similar incidents from occurring in the future. Pass compliance audits with less effort and expense Auditors require proof that specific processes and controls are — and have always been — in place. Netwrix Auditor provides hard evidence that your organization's IT security program adheres to PCI DSS, HIPAA, GDPR and other standards. Complete visibility into the broadest variety of IT systems In contrast to legacy auditing solutions, Netwrix Auditor delivers visibility and control across all of your on-premises and cloud-based IT systems in a unified way. This IT audit platform provides a single-pane-of-glass view across the entire IT infrastructure that enables IT teams to quickly detect suspicious behavior and investigate it thoroughly.
... Learn more
-
-
ROI-
-
19
16
logo
Offer a reference bonus
1.00

SolarWinds Dameware Remote Support

Key Features
  • Fast and secure remote control
  • Anywhere, anytime remote assistance
  • Simplify Windows™ administration
  • Built-in remote admin tools
  • Deliver remote support from iOS and Android devices
  • Remotely manage Active Directory® environments
Remote administration software for end-user support and system troubleshooting from anywhere.
  • Broaden support capabilities - Go beyond the scope of Dameware® Mini Remote Control to provide more comprehensive end-user support
  • Reduce time to resolution - Leverage built-in system administration tools for even faster IT resolution
  • Multi-platform access you need - Quick and easy remote access to Windows, Mac OS® X, and Linux® computers
... Learn more
-
-
ROI-
-
14
2
logo
Offer a reference bonus
1.00

SolarWinds Network Performance Monitor

Key Features
  • Multi-vendor network monitoring
  • NetPath™ critical path visualization
  • Performance analysis dashboard
  • Intelligent alerts
  • Network Insight for Cisco ASA
  • Network Insight for F5 BIG-IP
Learn why SolarWinds is #1 in network management software.
  1. Unexpected simplicity - Powerful and intuitive network monitor, so you can start solving problems right away.
  2. Fully scalable- Out-of-the box network monitoring scales to handle all the growth your organization can throw at you, today and tomorrow.
  3. What you need, when you need it - Tailor NPM to your needs with multi-vendor support, customizable dashboards, views, and charts.
  4. Built by IT pros, with IT pros - We’ve worked as network and systems engineers, so we understand your problems and how to solve them.
... Learn more
-
-
ROI-
-
20
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.