View
Sorting
From A to Z
Products found: 13
FortiGate
FortiGate® - network security platform provides unmatched performance and protection while simplifying the network infrastructure.
FortiGate-20 - for small businesses and offices
FortiGate-5000 - for very large enterprises and service providers.
Our award-winning network security appliances provide one platform for end-to-end security across your entire network. FortiGate next gen firewalls are optimized for internal segmentation, perimeter, cloud, data center, distributed, and small business deployments. Simplify your security posture with one security solution across your physical, virtual, and cloud deployments.
Fortinet FortiMail Secure Email Gateway
Email security remains a key productivity tool for today's organizations, as well as a successful attack vector for cyber criminals. According to the Verizon 2018 Data Breach Investigations Report, 49% of malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used." FortiMail Email security utilizes the latest technologies and security services from FortiGuard Labs to deliver consistently top-rated protection from common and advanced threats while integrating robust data protection capabilities to avoid data loss.
FortiMail Product Details
Organizations typically select FortiMail email security to shield users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more.
Features and Benefits
- Top-rated Antispam and Antiphishing: Maintain productivity by shielding end users from unwanted spam and malicious phishing attacks
- Independently certified advanced threat defense: Thwart cyber criminals intent on stealing data, holding systems for ransomware, conducting fraud, and other malicious purposes
- Integrated data protection: Maintain the privacy of personal information and confidentiality of sensitive data in compliance with regulatory and corporate guidelines
- Enterprise-class management: Free staff and end users to drive the business by reducing the time spent on email administration
- High-performance mail handling: Speed the delivery of legitimate email at an affordable cost
Fortinet NGFW
Enterprise Firewall
Our award-winning FortiGate enterprise firewalls provide high performance, consolidated advanced security and granular visibility for broad protection across the entire digital attack surface. FortiGate enterprise firewalls reduce complexity and improve overall security posture by providing full visibility into users, devices, applications and threats on the network, with the ability to apply advanced threat protection anywhere in the network. Our purpose-built security processors (SPUs) deliver scalable performance of advanced security services, industry-leading VPN and SSL inspection throughput, and ultra low latency for protecting internal segments and mission critical environments. Our validated FortiGuard security services protect against known and unknown threats, zero-day exploits, malware, and malicious websites using FortiGuard Labs continuous threat intelligence, dynamic analysis for detection, and automated mitigation to keep your network protected from advanced cyberattacks. FortiGate enterprise firewalls deliver the lowest total cost of ownership along with supporting scalable, flexible deployments from the network edge to the core, data center, internal segments, and the cloud. FortiGates are Security Fabric enabled, providing the broad visibility, automated protection and integrated threat intelligence required to protect the valuable assets and data of organizations worldwide.
FortiGate includes:
- Consolidated, validated highest efficacy advanced security services
- Real-time response based on threat intelligence to protect any point of vulnerability in the network
- Integrated audit and compliance services to improve cybersecurity
- Industry's fastest SSL inspection engine to help protect against malware hiding in encrypted traffic
- Single-pane-of-glass management to simplify deployment and enable consistent security policies with granular control and visibility
- Multiple network deployments – as a next-generation firewall, data center firewall, internal segmentation firewall, or high speed firewall and VPN
FortiWeb: Web Application Firewall (WAF)
FortiWeb Product Details Whether to simply meet compliance standards or to protect mission-critical hosted applications, FortiWeb's web application firewalls provide advanced features that defend web applications from known and zero-day threats. Using an advanced multi-layered and correlated approach, FortiWeb provides complete security for your external and internal web-based applications from the OWASP Top 10 and many other threats. At the heart of FortiWeb are its dual-layer AI-based detection engines that intelligently detect threats with nearly no false positive detections.
Features and Benefits
- Proven Web Application Protection. FortiWeb protects against all the OWASP Top-10 threats, DDoS attacks and many others to defend your mission critical web-based applications
- AI-based Threat Detection. In addition to regular signature updates and many other layers of defenses, FortiWeb’s AI-based, dual-layer machine learning engines protect against zero-day attacks
- Security Fabric Integration. Integration with FortiGate firewalls and FortiSandbox deliver protection from advanced persistent threats
- Advanced Visual Analytics. FortiWeb’s visual reporting tools provide detailed analyses of attack sources, types and other elements that provide insights not available with other WAF solutions
- False Positive Mitigation Tools. Advanced tools that minimize the day-to-day management of policies and exception lists to ensure only unwanted traffic is blocked
- Hardware-based Acceleration. FortiWeb delivers industry-leading protected WAF throughputs and blazing fast secure traffic encryption/decryption
NetApp Converged Infrastructure Solution for Data Analytics
Key Benefits
Proven, affordable performance
• Increase search performance by up to an average of 118% compared to commodity servers with internal disks
• Speed data analysis from weeks to hours and generate reports 3x faster
• Leverage a hybrid architecture to optimize performance and capacity buckets for Splunk’s hot, warm, and cold data tiers
Security and reliability with best-of-breed solution
• Get greater than 99.999% hardware availability backed by experience from more than 1 million deployments
• Enable media erasure and full disk encryption
• Improve reliability with a groundbreaking solution that leverages enterprise storage building blocks
Simplified deployment and access to data
• Scale compute and storage independently to better match application workloads
• Simplify deployment and accelerate time to value from months to weeks with a pretested NetApp
Verified Architecture
• Easily install and administer your storage systems by using on-box, web-based, and powerful NetApp®
The NetApp Converged Infrastructure Solution for Splunk brings together the latest storage, networking, and server technologies in a pretested, prevalidated reference architecture to help you simplify deployment of Splunk environments. Accelerate your time to insight so you can drive rapid innovation and discover new ways to engage with your customers.
Composed of Cisco UCS C-Series servers, Cisco Nexus switches, and NetApp E2800 hybrid storage systems, this groundbreaking infrastructure delivers superior performance for faster decision making and improved business agility. NetApp E-Series storage systems provide better performance, data availability, scalability, and data protection for Splunk workloads compared to commodity servers with internal drives.
Together, the solution’s prevalidated architecture and modular scalability make it easy to deploy and scale as you grow.
Proven, Affordable Performance
Powered by the speed of NetApp E2800 hybrid flash storage systems, the NetApp Converged Infrastructure Solution for Splunk increases performance compared to commodity servers with internal storage, enabling you to search and analyze Splunk data in less than half the time.
Recent testing that closely simulated real-world Splunk search performance showed conclusively that operations have much to gain from the NetApp storage approach.
Searching was significantly faster with NetApp versus commodity servers with internal storage, on average up to 118% faster. Very dense searching was up to 35% faster, and rare search performance was up to 200% faster. NetApp installations have seen even faster search run times.
NetApp Converged Infrastructure решение для Data Analytics
Основные преимущества
Доказанная доступная производительность
• Увеличьте производительность поиска в среднем на 118% по сравнению с товарными серверами с внутренними дисками
• Анализ данных скорости с недель до нескольких часов и генерация отчетов в 3 раза быстрее
• Использование гибридной архитектуры для оптимизации производительности и емкости вместимости для горячих, теплых и холодных уровней данных Splunk
Безопасность и надежность с лучшим в своем классе решением
• Получите доступность аппаратного обеспечения более 99,999% при использовании более 1 миллиона развертываний
• Включите стирание носителей и полное шифрование диска.
• Повысьте надежность благодаря революционному решению, которое использует блоки хранения корпоративных хранилищ
Упрощенное развертывание и доступ к данным
• Масштабировать вычисления и хранение, чтобы лучше соответствовать нагрузкам приложений
• Упростите развертывание и ускорьте время на использование от нескольких месяцев до нескольких недель с помощью предварительно протестированного NetApp
Проверенная архитектура
• Простота установки и администрирования систем хранения с использованием встроенных, сетевых и мощных NetApp®
Решение конвергентной инфраструктуры NetApp для Splunk состоит из серверов Cisco UCS C-Series, коммутаторов Cisco Nexus и NetApp E2800. Эта инновационная инфраструктура обеспечивает превосходную производительность для более быстрого принятия решений и повышения гибкости бизнеса. NetApp E-Series системы хранения обеспечивают лучшую производительность, доступность данных, масштабируемость и защиту данных рабочих нагрузок Splunk по сравнению с товарными серверами с внутренними дисками.
Вместе, превалируемая архитектура решения и модульная масштабируемость упрощают развертываемость и масштабируемость по мере роста.
Проверенная, доступная производительность. Работает на скорости гибридных флэш-накопителей NetApp E2800, NetApp
Конвергентное инфраструктурное решение для Splunk повышает производительность по сравнению с товарными серверами с внутренним хранилищем, позволяющие выполнять поиск и анализ Splunk.
Недавнее тестирование, которое тщательно смоделировало реальную производительность поиска Splunk, показало, что операции имеют много общего с подходом к хранению NetApp.
NetApp E-Series
Figure 1) E-Series product line.
E-Series is designed to make SANs simple, with dynamic disk pools to eliminate RAID management; robust I/O queuing algorithms optimized for SSDs; proven high availability; and out-of-the-box features including mirroring, replication, point-in-time recovery, and thin provisioning.
I get a lot of questions about how E-Series fits in the NetApp portfolio, so I thought I'd start by answering those questions before digging into the specifics of products and use cases.
Where E-Series Fits
If you're not familiar with the E-Series design and speeds and feeds, Tech OnTap published an introductory article in March 2013, which is a good place to start.
Two major criteria differentiate E-Series from FAS:
Dedicated storage. FAS is designed as shared storage; lots of different workloads share the same storage system. E-Series is a better fit for applications that need dedicated storage such as SAN-based business apps, dedicated backup targets, and high-density storage repositories.
Data management. FAS integrates a wide range of data management, data protection, and storage efficiency features as part of the storage system. However, if you have an application that manages its own data, those capabilities might just sit idle, and E-Series is a great alternative.
Where FAS delivers incredible storage efficiency, E-Series is designed to deliver performance efficiency with excellent price/performance from entry to enterprise, maximum disk I/O for minimum cost, and sustained high bandwidth and IOPS.
Here are a few additional things that you may want to know about E-Series storage. Many of these are based on misconceptions that come up frequently:
Does not run Data ONTAP®. E-Series systems run a separate operating environment called SANtricity® that is unrelated to Data ONTAP.
Block only. E-Series is simple, streamlined SAN storage designed to deliver superior price/performance. E-Series does not directly support any NAS protocols.
Direct host connections. All E-Series models can support direct high-speed SAS connections to hosts. You can share a single storage system among a small number of servers without the complexity of a network or SAN.
SSD capable. All E-Series models can support both SSD and HDD. You can use SSDs as persistent storage or as part of an SSD cache.
Highly available. All E-Series configurations can be configured with dual controllers for high availability. In fact, E-Series delivers 99.999% availability, just like FAS. NetApp AutoSupport™ is available for the E-Series platform.
Not just for HPC. E-Series cut its teeth in scientific and technical environments and remains a great fit for those applications. However, it's also becoming popular for a wide range of business and general use cases.
Plays well with FAS. Increasingly, we're seeing use cases that combine the strengths of FAS and E-Series storage. Check out the other articles in this issue on the EF550 and Oracle OpenWorld highlights for examples.
NetApp Ontap AI
Get started in AI faster
Eliminate guesswork with a validated reference architecture that detangles design complexity. With NetApp ONTAP AI proven architecture, you’ll also reduce overall costs while accelerating AI innovation and productivity.
NVIDIA + NetApp ONTAP AI : Built on a verified architecture that combines NVIDIA DGX-1 supercomputers, NetApp AFF storage, and Cisco networking supercharges your AI/DL environments. Industry-leading NVIDIA DGX-1 AI supercomputers. At the heart of ONTAP AI is the NVIDIA DGX-1 supercomputer, a fully-integrated hardware and software turnkey system that is purpose-built for DL. The DGX platform leverages the NVIDIA GPU Cloud Deep Learning Software Stack, which is optimized for maximum GPU accelerated DL performance.
The world’s fastest cloud-connected flash: NetApp AFF systems NetApp AFF systems keep data flowing to DL processes with the industry’s fastest and most flexible all flash storage, featuring the world’s first end-to-end NVMe technologies. The A800 is capable of feeding data to NVIDIA DGX-1 systems up to 4 times faster than competing solutions
NVIDIA + NetApp ONTAP AI : Built on a verified architecture that combines NVIDIA DGX-1 supercomputers, NetApp AFF storage, and Cisco networking supercharges your AI/DL environments. Industry-leading NVIDIA DGX-1 AI supercomputers. At the heart of ONTAP AI is the NVIDIA DGX-1 supercomputer, a fully-integrated hardware and software turnkey system that is purpose-built for DL. The DGX platform leverages the NVIDIA GPU Cloud Deep Learning Software Stack, which is optimized for maximum GPU accelerated DL performance.
The world’s fastest cloud-connected flash: NetApp AFF systems NetApp AFF systems keep data flowing to DL processes with the industry’s fastest and most flexible all flash storage, featuring the world’s first end-to-end NVMe technologies. The A800 is capable of feeding data to NVIDIA DGX-1 systems up to 4 times faster than competing solutions
NetApp Solution for Storage as a Service
NetApp’s Storage-as-a-Service is available as four service offerings with flexible and scalable capacity growth to suit most requirements:
- High Performance: NetApp’s all-flash arrays underpin this service. Ideal for database, analytics and virtualised , performance intensive and/or latency-sensitive high write applications.
- Performance: Also delivered on NetApp’s all-flash arrays, this service is ideal for any applications that need the performance of all-flash technology, but don’t demand ultra-low latency response times
- Value: Powered by NetApp’s enterprise storage arrays, this service is for high capacity applications such as email, web content, files shares, backup and replication.
- Archive: Comprised of NetApp’s S3-compliant object storage, ideal for long term backup and archiving such as medical records and imagery.
NetApp Solution для Storage as a Service
NetApp Storage-as-a-Service доступен в виде четырех предложений услуг с гибким и масштабируемым ростом производительности в соответствии с большинством требований:
- Высокая производительность: все эталонные массивы NetApp поддерживают эту услугу. Идеально подходит для работы с базами данных, аналитикой и виртуализированными, высокопроизводительными и/или латентными приложениями с высокой степенью записи.
- Производительность: также поставляется на всех флэш-массивах NetApp, эта услуга идеально подходит для любых приложений, для которых требуется производительность всех флеш-технологий, но не требует времени отклика со сверхнизким временем ожидания
- Значение. При работе с массивами хранения данных NetApp эта услуга предназначена для приложений большой емкости, таких как электронная почта, веб-контент, общие папки, резервное копирование и репликация.
- Архив: Состоит из хранилища объектов NetApp, совместимого с S3, идеально подходит для долгосрочного резервного копирования и архивирования, таких как медицинские записи и изображения.
PA-500 next-generation firewall
Key Security Features:
Classifies all applications, on all ports, all the time
• Identifies the application, regardless of port, encryption (SSL
or SSH), or evasive technique employed.
• Uses the application, not the port, as the basis for all
of your safe enablement policy decisions: allow, deny,
schedule, inspect and apply traffic-shaping.
• Categorizes unidentified applications for policy control,
threat forensics or App-ID™ development.
Enforces security policies for any user, at any location
• Deploys consistent policies to local and remote users
running on the Windows®, Mac® OS X®, Linux®, Android®,
or Apple® iOS platforms.
• Enables agentless integration with Microsoft® Active
Directory® and Terminal Services, LDAP, Novell®
eDirectory™ and Citrix®.
• Easily integrates your firewall policies with 802.1X wireless,
proxies, NAC solutions, and any other source of user
identity information.
Prevents known and unknown threats
• Blocks a range of known threats, including exploits,
malware and spyware, across all ports, regardless of
common threat-evasion tactics employed.
• Limits the unauthorized transfer of files and sensitive data,
and safely enables non-work-related web surfing.
• Identifies unknown malware, analyzes it based on
hundreds of malicious behaviors, and then automatically
creates and delivers protection.
The controlling element of the PA-500 is PAN-OS®,
a security-specific operating system that natively
classifies all traffic, inclusive of applications, threats
and content, and then ties that traffic to the user, regardless
of location or device type. The application, content,
and user – in other words, the business elements that
run your business –mare then used as the basis of
your security policies, resulting in an improved security
posture and a reduction in incident response time.
Palo Alto Networks next-generation firewall (NGFW)
Flexible deployment options and native integration with our next-generation platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.
Superior architecture, superior benefits
Complete visibility and precise control: Our next-generation firewalls provide complete visibility into all network traffic based on applications, users, content and devices. Automated security: Innovative features reduce manual tasks and enhance your security posture, for example, by disseminating protections from previously unknown threats globally in near-real time, correlating a series of related threat events to indicate a likely attack on your network, and using dynamic address groups in security rules to avoid updating server IP addresses frequently. Protection for your users and data everywhere: Our next-generation firewalls are natively integrated with our security platform, which prevents advanced and unknown cyberthreats no matter where the users and data are located: in your network, on your endpoints and in the cloud.
Products: PA-5000 Series, PA-4000 Series, PA-3000 Series, PA-2000 Series, PA-500, PA-200, VM-Series, Management Platforms
Visibility and Control
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
Threat Prevention
The combination of Content-IDTM and WildFireTM provides protection from known and unknown threats. Content-ID limits unauthorized data transfer and detects and blocks a wide range of threats. WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment, and automatically disseminates updated protections globally in near-real time.
Built-in, not Bolted-on
Today’s security architectures are a result of adding uncoordinated security layers one at a time, making them ineffective in dealing with modern threats. Unlike legacy firewalls that are based on this "layered security" architecture, our next-generation firewalls use a unified security design that classifies all traffic into full context before applying one set of flexible security rules in a single pass.
Palo Alto Networks межсетевой экран нового поколения (NGFW)
Безопасная работа приложений как необходимое условие успешного развития бизнеса
Безопасная работа приложений, обеспечиваемая с помощью сетевых экранов Palo Alto Networks нового поколения, помогает решить проблемы безопасности бизнеса, связанные с растущим числом используемых в сети приложений. Обеспечение безопасного доступа к приложениям для отдельных пользователей или групп пользователей – локальных, мобильных и удаленных – и защита трафика от известных и неизвестных угроз позволяет усилить безопасность и одновременно поддержать рост бизнеса.
• Классификация всех приложений, на всех портах, в любое время. Средства точной классификации трафика – основной компонент любого межсетевого экрана, а результаты их работы становятся основой политики безопасности. Современные приложения легко обходят межсетевые экраны, выполняющие фильтрацию трафика на основе портов, путем динамической смены портов, использования протоколов SSL и SSH, туннелирования своего трафика через порт 80 или использования нестандартных портов.
• Включение в политику безопасности не только IP-адресов, но также пользователей и устройств. Создание и управление политиками безопасности на основе приложений и идентификации пользователей, независимо от устройства или местоположения, является более эффективным средством защиты вашей сети, чем решение, основанное исключительно на портах и IP-адресах. Интеграция с различными корпоративными каталогов пользователей позволяет идентифицировать пользователей Microsoft Windows, Mac OS X, Linux, Android или iOS, которые осуществляют доступ к приложениям. Пользователи, которые находятся в командировке или работают удаленно, защищены с помощью тех же согласованных политик безопасности, которые действуют в локальной или корпоративной сети. Сочетание возможностей мониторинга и контроля использования приложений пользователями означает, что можно обеспечить безопасное использование Oracle, BitTorrent, Gmail или любого используемого в сети приложения, независимо от того, где и какой пользователь осуществляет доступ к нему.
• Предотвращение всех угроз – как известных, так и неизвестных. Чтобы обеспечить безопасность современной сети, необходимо найти устранить известные уязвимые места, обеспечить защиту от вредоносного и шпионского ПО, а также совершенно неизвестных и целенаправленных угроз. Этот процесс начинается с сокращения возможностей для сетевых атак путем разрешения доступа конкретным приложениям и запрета доступа всем остальным приложениям: либо с помощью неявной стратегии «запрещать все остальные», либо с помощью задаваемых в явном виде политик. Координированные меры по предотвращению угроз могут примяться ко всему разрешенному трафику, за один проход блокируя известные опасные сайты, уязвимости, вирусы, программы-шпионы и запросы злоумышленников к DNS-серверам. Активный анализ и идентификация неизвестных вредоносных программ осуществляется путем прямого запуска неопознанных файлов в виртуальной среде «песочница» и проверки на предмет более 100 видов вредоносного поведения. При обнаружении новых вредоносных программ автоматически генерируются и предоставляются сигнатуры зараженных файлов и связанного с ними вредоносного трафика. Анализ, связанный с предотвращением угроз, осуществляется с учетом контекста приложений и протоколов связи, гарантируя неизбежное выявление даже тех угроз, которые пытаются скрыться от систем безопасности в туннелях, сжатой информации или нестандартных портах.
Гибкость внедрения и управления
Функции обеспечения безопасной работы приложений могут быть внедрены либо на основе специально созданной аппаратной платформы, либо на виртуализированном решении. При развертывании нескольких межсетевых экранов Palo Alto Networks в виде аппаратной или виртуализированной платформы можно использовать дополнительное средство централизованного управления Panorama, позволяющее централизованно осуществлять мониторинг шаблонов трафика, внедрять политики безопасности, формировать отчеты и выполнять обновления.
- Обеспечение безопасной работы приложений: комплексный подход
- Универсальный редактор политик: привычный интерфейс и набора функций позволяет быстро создавать и внедрять политики контроля приложений, пользователей и информации.
- Обеспечение работы приложений и снижение риска
Основные линейки устройств:
PA-5000 Series, PA-4000 Series, PA-3000 Series, PA-2000 Series, PA-500, PA-200, VM-Series, Management Platforms
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.