View

Sorting

Products found: 5

logo
Offer a reference bonus
1.00

Firemon Security Manager

Security Manager helps enterprises manage their firewalls, routers, switches and load balancers more effectively, by detecting and reporting any changes to firewall policy, increasing visibility and reducing the cost of making changes. Security Manager shows you which of your rules are unused and how traffic flows through each rule, letting you clean up unnecessary access and tighten down existing rules. And with continued, automated analysis of regulations like PCI, HIPAA, SOX, NERC-CIP, ISO 27001, and NSA guidelines, Security Manager greatly improves your compliance posture. Access Path Analysis expands visibility of enterprise network behavior by identifying the detailed risk path through the network, including the interfaces, routes, security rules and address translation rules that allow the access path that introduces risk. It gives network security operators the information necessary to make a precise change and reduce risk without impacting network operations. And FireMon Insight, a real-time dashboard, gives users a one-stop view of the critical metrics from across your security configurations.
... Learn more
-
-
ROI-
-
15
10
logo
Offer a reference bonus
1.00

Group-IB TDS — Threat Detection System

  • Intrusion detection with immediate notifications on all relevant malware families
  • Identification of infected devices in your organization’s wireless networks
  • Incident response with manual review of critical incidents by Group-IB experts
  • Top-tier usability and reporting features on detected threat 
  • Automated daily updates of filter rules and signatures 24/7 support through IT ticketing system
TDS – Advanced Threat Detection Group-IB TDS (Threat Detection System) is an intrusion detection and prevention tool to protect your network. It is a unique product by Group-IB, born out of our incident response expertise, skills in detecting malware and threat intelligence foundation. As a component of Group-IB’s early warning system TDS benefits from other products, which contribute to its effectiveness. Group-IB’s SOC team is there for you 24/7 to prevent and remedy any network threats and breaches. Advanced persistent threat detection lowers cyber threats to your organization and ensure your network is protected from the most advanced cyber threats and threat actors. How TDS works TDS Sensor:
  • Traffic inspection to prevent attacks and detect malware by identifying communications with Command and Control (C&C) servers, network anomalies and unusual user behavior.
  • Analyzes suspicious files in Group-IB’s sandbox, Polygon, in order to identify attacks at the earliest stage.
TDS Polygon
  • Advanced threat detection in your network to shield it against:
  • Malicious e-mails
  • Attacks on browsers
  • Attacks using unknown malware or tools
  • Polygon, Group-IB’s sandboxing technology, embraces machine learning and advanced data analysis techniques to handle and rate cyber security incidents.
Group-IB’ SOC:
  • Identifies all information security incidents in a web-interface to give your staff an overall view of all cyber security events online.
  • Suspicious incidents are analyzed by Group-IB’s SOC team and classified for your security team 24/7/365.
  • A convenient ticketing system ensures that all inquiries and responses are easily tracked and addressed.


... Learn more
-
-
ROI-
-
5
1
logo
Offer a reference bonus
1.00

Group-IB TDS — обнаружение целевых атак

  • Мгновенные уведомления об активности всех актуальных и ранее неизвестных семейств вредоносных программ 
  • Определение зараженных мобильных устройств сотрудников и гостей 
  • в Wi-Fi сетях 
  • Ручной анализ логов и выделение критически важных инцидентов 
  • экспертами Group-IB
  • Удобный веб-интерфейс и наглядные отчеты о выявленных угрозах 
  • Регулярно обновляемый классификатор на основе данных, накопленных за 14 лет расследований и экспертиз 
  • Круглосуточная поддержка и консультации через удобную тикет-систему
Зачем нужен TDS Китайское шпионское ПО, трояны Corkow, Anunak и Buhtrap, более 100 видов вредоносных программ под мобильные платформы - все эти угрозы агрессивно атакуют российский бизнес и компании государственного сектора, несмотря на повсеместное распространение антивирусных средств. TDS позволяет организовать объективный контроль сетевого трафика и вовремя выявлять ключевые угрозы на сетевом уровне, основываясь на передовой экспертизе и эксклюзивной разведывательной информации Group‑IB. Как работает TDS TDS Sensor: Выявляет коммуникации зараженных устройств с командными центрами, общие сетевые аномалии и необычное поведение устройств Извлекает потенциально опасные объекты, передаваемые по сети организации, для анализа в системе Polygon TDS Polygon Позволяет предотвратить заражения в результате: Вредоносных почтовых рассылок Атак на браузер Атак с использованием ранее неизвестных вредоносных программ и инструментов. Вердикт о степени опасности объекта выносится на основании классификатора, формируемого системой машинного анализа. SOC Group-IB: Собирает информацию о событиях ИБ для демонстрации в удобном web-интерфейсе; В круглосуточном режиме анализирует и классифицирует инциденты руками опытных аналитиков; Отвечает на любые вопросы с помощью тикет-системы Преимущества TDS TDS является частью единой системы раннего обнаружения угроз Group-IB. Данные анализируются сенсором с учетом информации, поступающей из системы Threat Intelligence, позволившей компании дважды войти в отчеты Gartner в категории “Threat Intelligence”. В результате в отличие от зарубежных аналогов TDS достигает наибольшей эффективности в детектировании локальных угроз и сигнатур, актуальных именно для российского рынка. Если вашу компанию будут атаковать, Group-IB предоставит услуги по реагированию и расследованию инцидента, и оформит цифровую доказательную базу в соответствии с требованиями законодательства.
  • Оперативные уведомления о выявленных угрозах через почту и SMS
  • Удобный веб-интерфейс для работы с информацией об инцидентах
  • Интеграция с SIEM и системами хранения событий и логов 
  • Автоматическая генерация отчетов по типам атак и временным периодам
... Learn more
-
-
ROI-
-
8
17
logo
Offer a reference bonus
1.40

Tufin Orchestration Suite

Gain visibility & control across physical networks & hybrid cloud environments Reduce the attack surface & ensure continuous compliance Implement security changes in minutes instead of days Tufin Security Policy Orchestration for Today’s Enterprise Networks Learn how the Tufin Orchestration Suite empowers you to visualize and control your network security policy across all on-premise environments and cloud platforms Whatever your industry, at Tufin we understand the serious network security challenges that your enterprise faces every day: Complexity Today’s hybrid IT reality is multi-vendor as well as multi-technology, resulting in limited visibility and control for enterprise networks spanning physical and cloud platforms. Change Ever-changing network security policies introduce new attack vectors. In addition, enterprises must handle an overwhelming volume of changes, while remaining secure and efficient. Cybersecurity Cyber-attacks will happen and organizations must do everything they can to contain these threats which are increasing at an alarming rate. Connectivity Application-centric security and connectivity management is critical to avoid outages and ensure business continuity. Compliance There is an ever-present need for audit readiness to enforce and demonstrate compliance with internal and regulatory standards as your industry requires. In addition, massive projects like data center migration, application migration and moving workloads to the cloud magnify the challenges of daily operations. The Tufin Orchestration Suite Solution The award-winning Tufin Orchestration Suite is a policy-centric solution for automatically analyzing risk, designing, provisioning and auditing network security changes. Tufin reduces the attack surface and minimizes disruptions to critical applications. Its network security automation enables enterprises to implement security changes in minutes instead of days with continuous compliance and increased agility. Tufin Orchestration Suite provides multi-vendor device support for leading enterprises networks, including finance, telecom, energy and utilities, healthcare, retail, education, government, manufacturing, transportation and auditing. Tufin’s Technology Alliance involves close partnership with industry leaders to provide seamless integration of the award-winning Tufin Orchestration Suite with their solutions. Capabilities Single Pane of Glass for Network Security Network Security Policy Baseline Application-Centric Security & Connectivity Management Network Security Change Automation Compliance & Audit Readiness Interoperability with IT Service Management, Ticketing & 3rd Party Systems
... Learn more
-
ROI-
-
3
13
logo
Offer a reference bonus
1.00

WatchGuard Dimension

From the board room to the branch office, critical decisions about network security often need to be made quickly and with limited information. How can you ensure that your decisions are timely, effective, and better informed? You need Visibility. WatchGuard Dimension™ is a cloud-ready network security visibility solution that comes standard with WatchGuard's flagship Unified Threat Management and Next Generation Firewall platform. It provides a suite of big data visibility and reporting tools that instantly identify and distill key network security threats, issues and trends, accelerating the ability to set meaningful security policies across the network. Use WatchGuard Dimension to monitor and gain critical and timely insights about network security, in real-time, from anywhere and at any time, easily and quickly Start with the Big Picture A picture is worth a thousand words or traffic logs! Get a high-level, aggregated “big picture” view of network activity that pinpoints top threats and trends, active policies and traffic patterns, and correlated views of top users and applications. Tap into Visible Insights See network activity presented visually, in real-time, in intuitive and interactive dashboards and reports. The elegant visualizations make it easy to identify potential threats, monitor Internet usage and to gain critical insights about related traffic trends. See, at a glance, who is consuming the most bandwidth, if there are unusual traffic patterns, and what are the most-visited websites. Easily pivot, drill-down, and filter to get exactly the info you need, when you need it. Then, you can drill all the way down to individual log data that reveals key details Spot Patterns, Make Better Decisions Choose from over 100 comprehensive reports, with the ability to schedule reports for email delivery to key stakeholders – from C-level executives and IT Directors, Network Managers and Security Analysts, to HR and Department Managers. Special reports are available for PCI and HIPAA compliance. Then Take Action with Dimension Command Dimension Command is our suite of management tools for WatchGuard Dimension. With it, IT pros have access to a host of network control features including one-click configuration changes, the ability to jump back to previous configurations, direct access to individual appliances through a web UI, and VPN management tools. Dimension Command is a purchase upgrade, and is automatically included in our Total Security Suite. Zero Install No complicated setup is required. Simply deploy a virtual appliance - includes OS, database, utilities, and WatchGuard server software - and you’ll be up and running in a few minutes.
... Learn more
-
-
ROI-
-
11
19

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.