Cyberoam

Securing You
...

Cyberoam UTM (Unified Threat Management)

Hardware that has the ability :

  • Firewall layer 8
  • VPN
  • Load balancing & autofailover
  • Bandwidth management
  • Gateway AntiVirus and AntiSpam
  • IPS (Intrusion Prevention System)
  • Web & application filtering
  • Outbound Spam
  • Web & application firewall

With high-speed Internet becoming a reality in organizations along with rising number of devices per user and data usage increasing at exponential rates, the next-generation security appliances must match the needs of future networks. Cyberoam NG series delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match.

NG series for SOHO and SMEs:
The NG series appliances for SOHO, SMEs are the “fastest UTMs” made for this segment.

NG Series for Large Enterprises:
The NG series appliances for enterprises offer “Next-Generation Firewall (NGFW)” protection to large enterprises with NGFW capabilities offering high performance required for future enterprise networks.

With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology attaches User-Identity to security, adding speed to an organization’s security. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

 Download catalog

GTB Technologies

Next Generation DLP
...

GTB Technologies Data Loss Prevention Suite

GTB Technologies has re-invented the enterprise data loss prevention marketplace, bringing a broad set of influential innovations to a market that has largely been misunderstood by other vendors, and at times analysts.

Our products provide unprecedented, real-time visibility and control of content – without performance degradation.

  • Accuracy
  • All Protocols / Ports
  • Scalability
  • Security
  • Language support
  • Lowest cost of ownership

Security Solution
Companies are struggling to identify and protect sensitive information. Confidential customer data, intellectual properties, trade secrets and legal documents are being shared against authorization, costing organizations millions in restitution. Because this sensitive information is so easily accessible, in today’s open environments, the need for data security has amplified.

 Download catalog

Cimtrak

Detecting the unknown
...

Cimtrak - Detecting The Unknown

Cimtrak is software that serves to maintain the configuration of network devices such as Routers / Switches, Database, Firewalls, Critical Workstations / PC, ESX / ESXi Server to configure a not change without the knowledge of administrators and ongoing configuration will not be changed without the approval of the administrator.

So that network devices safe from interruptions caused by configuration changes intentional or unintentional. Some of these workings cimtrak software include :

  • Restore From Repository, restoring a configuration that has been recorded from the Repository.
  • Update Baseline, overtaking any changes and saved as a new copy.
  • Logs, noting any changes in the report.
  • Custom, tailored to the action taken.

Certero - AssetStudio

Software asset management
... ...

AssetStudio - Software asset management

Asset Studio adalah software IT Asset Management (ITAM) yang akan membantu anda untuk melakukan inventarisasi asset dilingkungan perusahaan. Dimana dengan tools ini anda akan dapat melakukan :

  • Discovery, tracking where the file is located.
  • Inventory, keep records in the form of physical assets (PCs / Laptops / Servers, Routers, Switches, Gadgets, Ipad, vehicles etc.) as well as assets in the form of license.
  • Distribution, can make the distribution of patches to the PC / Laptop / Server.
  • Application Monitoring, will monitor existing applications on any PC / Laptop user.
  • License Management, manage how many licenses you have used and not used to see the effectiveness of the number of licenses that have been purchased.
  • Access Control, control user access to a device.
  • Remote Desktop Service, to be remotely on a PC / Laptop / Server that does not need much - much come to the device.
 Download catalog