View

Sorting

Products found: 3

logo
Offer a reference bonus
2.40

Forcepoint Data Security

Forcepoint Data Security Suite - detection, control and protection of confidential information and network end data Preventing data loss Business Process Security Managing Applications and Threats Data Discover - Detection of confidential information stored on the network Detecting the storage of sensitive data Measuring and reducing the risk of data loss Support for e-discovery for controlled monitoring Data Monitor - a tool for auditing and monitoring network data channels for leaks of confidential information Monitoring and blocking the leakage of confidential information Conducting an audit Measuring and reducing the risk of data loss Data Protect - detection and blocking of leaks of confidential information at the level of all network channels Monitoring and blocking the leakage of confidential information Conducting an audit Measuring and reducing the risk of data loss Data Endpoint - Detection and prevention of leakage of confidential information through target computers and removable media Monitoring and blocking the leakage of confidential information Conducting an audit Measuring and reducing the risk of data loss
... Learn more
ROI-
-
14
1
logo
Offer a reference bonus
1.40

Sophos UTM

Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection. Highlights Ì Every feature available  on every appliance Ì Firewall, VPN, ATP, IPS, email, web filtering and app control Ì Hardware, virtualized, software or cloudbased appliance Ì Intuitive browserbased interface Ì Built-in reporting on all models Ì Two-factor authentication with one-time password (OTP) in many areas Ì Integrated wireless controller Consolidated network security platform—no compromise Protect your network using multi-layered proven protection technologies including Advanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the industry’s simplest admin interface. We’ve engineered our software and hardware to give you the throughput speeds you need. And, you can choose the level of protection you need with modular subscriptions as every feature is available on every appliance. All the Next-Gen Firewall features you need We’ll give you complete control to block, allow, shape and prioritize applications. Our Deep Layer-7 inspection (Next-Generation Firewall) ensures true application identification and has regular automatic updates. And you’ll get feedback on unclassified applications too. Intuitive management and detailed reporting You’ll know what’s happening with your users and you’ll have complete control over all the features you need, with none of the complexity. Easily build policies while getting detailed real-time and historical data with our on-box reporting, helping you to fix problems fast. And our Free Sophos UTM Manager lets you centrally administer several appliances through a single login. Connect remote offices with easy VPN and Wi-Fi Sophos RED (Remote Ethernet Device) provides secure remote access to your off-site locations. It’s the first security gateway that requires no technical skills at the remote site. Once installed, it forwards traffic to the UTM for complete security. Sophos UTM also works as a wireless controller; access points are automatically set up and receive complete UTM protection.
... Learn more
-
ROI-
-
6
2
logo
Offer a reference bonus
2.70

TRITON AP-DATA

TRITON AP-DATA - обнаружение, контроль и обеспечение защиты конфиденциальной информации и конечных данных сети
  • Предотвращение потери данных
  • Безопасность бизнес-процесса
  • Управление приложений и угроз
Data Discover - обнаружение конфиденциальной информации, хранимой в сети
  • Обнаружение мест хранения конфиденциальных данных
  • Измерение и уменьшение риска потери данных
  • Поддержка e-discovery для разрешаемого контроля
Data Monitor - средство аудита и мониторинга сетевых каналов передачи данных на предмет утечек конфиденциальной информации
  • Мониторинг и блокировка утечки конфиденциальной информации
  • Ведение аудита
  • Измерение и уменьшение риска потери данных
  • Data Protect - обнаружение и блокировка утечек конфиденциальной информации на уровне всех сетевых каналов
  • Мониторинг и блокировка утечки конфиденциальной информации
  • Ведение аудита
  • Измерение и уменьшение риска потери данных
Data Endpoint - обнаружение и предотвращение утечки конфиденциальной информации через конечные компьютеры и сменные носители
  • Мониторинг и блокировка утечки конфиденциальной информации
  • Ведение аудита
  • Измерение и уменьшение риска потери данных
... Learn more
ROI-
-
5
11

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.