URL: http://www.guardium.com

Similar documents
Enterprise Security Solutions

The Fortinet Secure Health Architecture

The Fortinet Secure Health Architecture

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

IT Security. Muscat 15+ ABOUT US IN A GLANCE

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

RSA SecurID Two-factor Authentication

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

PortWise Access Management Suite

Web Security Gateway Solutions

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

V1.4. Spambrella Continuity SaaS. August 2

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

DriveLock and Windows 7

Did you know your security solution can help with PCI compliance too?

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

SANS Top 20 Critical Controls for Effective Cyber Defense

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

2013 AWS Worldwide Public Sector Summit Washington, D.C.

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Preemptive security solutions for healthcare

OVERVIEW. Enterprise Security Solutions

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

PortWise Access Management Suite

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Security Overview Enterprise-Class Secure Mobile File Sharing

SecureAge SecureDs Data Breach Prevention Solution

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

ForeScout MDM Enterprise

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Patch Management SoftwareTechnical Specs

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Inter-Tel 5000 Network Communications Solutions

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Symantec Protection Suite Small Business Edition

High performance security for low-latency networks

Endpoint protection for physical and virtual desktops

The ForeScout Difference

ADDING STRONGER AUTHENTICATION for VPN Access Control

Automate PCI Compliance Monitoring, Investigation & Reporting

WHITE PAPER: Egenera Cloud Suite

The Convergence of IT Security and Physical Access Control

PCI DSS 3.0 Compliance

MITEL Network Communications Solutions

WEBSENSE TRITON SOLUTIONS

IBM Data Security Services for endpoint data protection endpoint encryption solution

PULSE SECURE FOR GOOGLE ANDROID

Recording & Evaluation mobile and fixed platforms for every business. Screen Recording. Integrated Management Platform. Workforce Optimization

Ovation Security Center Data Sheet

Configuration Information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Strengthen security with intelligent identity and access management

STRONGER AUTHENTICATION for CA SiteMinder

The Convergence of IT Security and Physical Access Control

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

How Our Cloud Backup Solution Protects Your Network

Enterprise Database Security & Monitoring: Guardium Overview

Symantec Consulting Services

How To Manage Security On A Networked Computer System

Unified Threat Management, Managed Security, and the Cloud Services Model

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Mobile Device Management

McAfee Endpoint Protection Products

Safeguarding the cloud with IBM Dynamic Cloud Security

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

Injazat s Managed Services Portfolio

Guardium Change Auditing System (CAS)

Fortinet Advanced Threat Protection- Part 3

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

DMZ Gateways: Secret Weapons for Data Security

WHITE PAPER: Egenera Cloud Suite

PacketTrap One Resource for Managed Services

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Security Considerations for DirectAccess Deployments. Whitepaper

Contextual Authentication: A Multi-factor Approach

Endpoint protection for physical and virtual desktops

SecureVue Product Brochure

Secured Enterprise eprivacy Suite

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

The Cloud App Visibility Blindspot

Zone Labs Integrity Smarter Enterprise Security

Windows Least Privilege Management and Beyond

Ensuring the security of your mobile business intelligence

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Symantec Protection Suite Small Business Edition

SafeNet Securing Microsoft Solutions

How To Protect Your Data From Harm With Safenet

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Transcription:

Vendor Siemens Enterprise Communications - Enterasys Fortinet Guardium Solutions Routers/Switches Wireless Access Points NAC IPS/IDS SIEM IP Telephony FortiGate FortiAnalyzer FortiMail FortiScan FortiDB FortiScan FortiWifi FortiManager FortiClient FortiWeb FortiSwitch Guardium Description Enterasys Networks, Siemens Enterprise Communications have merged to form a market-leading provider of enterprise communications solutions. Enterasys network switching, routing and security solutions are used by thousands of customers in more than 70 countries worldwide to deliver business-oriented, identity-based visibility and control for voice, video, and data applications URL: http://www.enterasys.com Fortinet's comprehensive portfolio of security gateways and complementary products offers a powerful blend of ASICaccelerated performance, integrated multi-threat protection, and constantlyupdated, in-depth threat intelligence. This unique combination delivers the highest level of network, content, and application security for enterprises of all sizes, managed service providers, and telecommunications carriers, while reducing total cost of ownership and providing a flexible, scalable path for expansion. URL: http://www.fortinet.com Guardium provides the most widely-used solution for ensuring the integrity of corporate information and preventing information leaks from the data center. Guardium enterprise security platform prevents unauthorized or suspicious activities by privileged insiders, potential hackers, and end-users of enterprise applications such as Oracle EBS, PeopleSoft, SAP, BI, and in-house systems. At the same time, Guardium optimizes operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure. URL: http://www.guardium.com

Reflex Systems Reflex VMC Virtualization Managemen t, Security & Compliance Reflex VMC integrates security, compliance and management of the virtual environment by providing visibility, correlation, and control. This enables IT to manage the virtual enterprise based on existing organizational business processes and leverage virtualization to do things that were simply not possible in the physical data center. VMC: Management through a Single Pane of Glass Change Control & Configuration Monitoring Virtual Infrastructure Discovery & Mapping Software Asset Management Virtual Security (FW/IDS/IPS) CPU, Memory, Network & Storage Performance Timeline & Alerts for Audit & Compliance Virtual Infrastructure Alarms & Alerts URL: http://www.reflexsystems.com Catbird vsecurity Catbird s vsecurity provides comprehensive security solution for VMware. Fully leveraging virtualization s architectural elegance, the Catbird vsecurity offers the broadest and most cost-effective security protection for virtual networks of all sizes. This includes: VIM Virtual Infrastructure Monitoring Vulnerability Management IPS/IDS NAC URL: http://www.catbird.com

Check Point Full Disk Encryption Automatic encryption of laptop and desktop hard drives protects critical information and prevents corporate data breaches. Check Point Full Disk Encryption provides the highest level of data security with multi-factor pre-boot authentication and the strongest encryption algorithms. The entire hard drive contents - including the operating system and even temporary files - are automatically encrypted for a completely transparent end-user experience. Benefits: Protects corporate information from unauthorized access and prevents costly data breaches when laptops are lost or stolen Fast compliance with the highest security certifications - FIPS 140-2, Common Criteria EAL4 and BITS Comprehensive platform support including Windows 7, Mac OS X 10.6 (Snow Leopard) and Linux Highly scalable proven in data security deployments of more than 200,000 seats Rapid deployment as fast as 50,000 seats per month Trusted, market-leading data security 9 years in a row in the Leaders Quadrant of the Gartner Magic Quadrant for Mobile Data Protection FIPS 140-2. URL: http://www.checkpoint.com Check Point Media Encryption Check Point Media Encryption secures sensitive corporate data and blocks incoming malware by encrypting removable media such as USB storage devices, CDs and DVDs and controlling activity (read, write and execute) on ports and devices. All device content is automatically encrypted in the background for a transparent end-user experience. Unique to Check Point, users can access encrypted media securely on unmanaged computers with no client installation Benefits: Comprehensive control of endpoint ports and protection of corporate data stored on removable media and devices Transparent end-user experience with automatic data encryption and seamless integration with Windows CD/DVD wizard and Nero 9 Simplified administration and operation with single agent installation, centralized management, and central policy enforcement Integrated endpoint and network security capabilities including centralized logging of data movement and media usage for streamlined compliance and forensic analysis. URL: http//www. checkpoint.com

Websense Data Security Suite Websense Data Security Suite, the leading data loss prevention (DLP) solution, accurately prevents data loss, secures business processes, and manages compliance and risk by identifying your confidential data, monitoring it s use, discovering where it s stored, and protecting it, on the network and at the endpoint. Data Security Suite is tightly integrated with Websense Web security and email security solutions, supporting enforcement that is built-in or supported via third-party integration. Websense Web Security Gateway Websense Data Security Suite is managed by Websense TRITON Console, which integrates reporting and management of Websense data loss prevention and Websense Web security solutions into a single unified console. The TRITON Console also provides reporting and management of individual Websense data security solution modules. URL: http://www.websense.com Websense Web Security Gateway solutions are the industry s leading secure Web gateway solutions, providing the best protection against modern Web threats at the lowest total cost of ownership. They are the only solutions to provide enterprise-class data loss prevention and unified management of hybrid onpremise/security-as-a-service (SaaS) deployments. Secure Web gateway solutions enable organizations to leverage the power of Web 2.0 without worrying about malware, inappropriate content, employee productivity, or disclosure of sensitive information. URL: http://www.websense.com Websense Email Security Websense Email Security software incorporates multiple layers of real-time Web security and data security intelligence to provide leading email protection from converged email and Web 2.0 threats. It helps to manage outbound data leaks and compliance risk, and enables a consolidated security strategy with the trusted leader in Essential Information Protection. Blocks inbound and outbound email threats at the network gateway Guards against blended threats Granular policy control and reporting Protects confidential data within email and attachments URL: http://www.websense.com

ActivIdentity 4TRESS AAA CMS Smart Display Card ActivIdentity provides two distinct strong authentication platforms for organizations that are seeking to implement a cost-effective, flexible, and scalable solution: ActivIdentity 4TRESS AAA Server for Remote Access addresses the security risks associated with a mobile workforce accessing systems and data remotely. ActivIdentity 4TRESS Authentication Server offers support for many authentication methods (e.g., user name and password, knowledge-based authentication, one-time password, and public key infrastructure [PKI] certificates) and diverse audiences across a variety of service channels, making it the preferred versatile authentication platform for customer-facing transactions ActivIdentity offers a broad range of authentication devices that all interoperate with its Strong Authentication and Credential Management products. ActivIdentity Authentication Devices range from Smart Cards, Smart Card Readers, Smart USB Tokens, OTP Tokens, DisplayCard Tokens, and Soft Tokens to Hardware Security Modules. SecurEnvoy SecurAccess URL: http://www.actividentity.com SecurAccess from SecurEnvoy turns any mobile phone that can receive SMS into a ready-made authentication device. This pioneering zero-footprint solution cuts costs by using hardware you already own. Unlike traditional tokens that take months to deploy and replace, SecurAccess can roll out more than 15,000 new remote staff per hour without the pain, cost or environmental impact created by legacy hardware distribution. Strong, affordable, convenient two-factor authentication No password reset or PIN management issues No token/smartcard deployment, renewal or replacement costs No additional devices, no software required on the phone Passcode always available even if temporarily out of communication URL: http://www.securenvoy.com

SecurEnvoy SecurMail SecurMail enables individuals to send and receive email across the internet using standards based https and strong two-factor authentication of the recipient. By requiring two different forms of identification, you can make sure that the emails intended recipient is the only person who can read the mail Benefits No need to enroll or agree in advance to receive sensitive data No additional devices or passwords required by the recipient Compatible with any recipient email environment Guaranteed notification that the email has been received Doesn t get blocked by virus scanners and works with webmail. URL: http://www.securenvoy.com etouchware Safe-T Safe-T is an innovative all-in-one,secure Managed File Transfer (MFT) solution that is poised to revolutionize the way that data are conveyed. The Safe-T Solution offers simple, convenient, and secure managed file transfer both inside and outside the enterprise. Benefits: Intuitive file transfer from within Outlook or web interface No size limit in sending files or folders Tightly secured file transfer including secured links, password protection, file encryption, tracking, and DMZ front-end Secure file return from external users (partners, suppliers, customers) with no need to install any software or set up an account Powerful and flexible management capabilities, including users, permissions, reporting, and audit-trail functions The ability to mesh easily and completely with your existing infrastructure with no disruption Up and running within hours Deployed quickly and cost-effectively in single site, multisite, or distributed enterprise configurations Multiple security and audit trail capabilities to meet industry and governments regulations (SOX, HIPAA, FDA, and more) URL: http://www.safe-t.com

InnoVAD Solutions Ltd. (Formerly, BeSecured Information Technologies) is a value-added distributor of end-to-end solutions in the fields of networking and information security. The company is a member of the Forum Group (www.forum-group.com). Established in 2005, InnoVAD Solutions is committed to distributing unsurpassed products and solutions that will enable the highest sustainable margins for our business partners. InnoVAD provides a broad range of end-to-end solutions in the field of data and voice networks, IP Tel, network security, data security, virtual infrastructure management and security, database security, endpoint security, authentication and compliance. InnoVAD Solutions distributes its products through business partners comprising of leading integration and information security companies. Our business partners play a key role in our continued growth and success. InnoVAD Solutions is the first company in Israel to fully implement a model of Value-Added Distribution (VAD). InnoVAD Solutions is committed to the highest standards of business and channel excellence in all dealings with our reseller and vendor partners.