Vendor Siemens Enterprise Communications - Enterasys Fortinet Guardium Solutions Routers/Switches Wireless Access Points NAC IPS/IDS SIEM IP Telephony FortiGate FortiAnalyzer FortiMail FortiScan FortiDB FortiScan FortiWifi FortiManager FortiClient FortiWeb FortiSwitch Guardium Description Enterasys Networks, Siemens Enterprise Communications have merged to form a market-leading provider of enterprise communications solutions. Enterasys network switching, routing and security solutions are used by thousands of customers in more than 70 countries worldwide to deliver business-oriented, identity-based visibility and control for voice, video, and data applications URL: http://www.enterasys.com Fortinet's comprehensive portfolio of security gateways and complementary products offers a powerful blend of ASICaccelerated performance, integrated multi-threat protection, and constantlyupdated, in-depth threat intelligence. This unique combination delivers the highest level of network, content, and application security for enterprises of all sizes, managed service providers, and telecommunications carriers, while reducing total cost of ownership and providing a flexible, scalable path for expansion. URL: http://www.fortinet.com Guardium provides the most widely-used solution for ensuring the integrity of corporate information and preventing information leaks from the data center. Guardium enterprise security platform prevents unauthorized or suspicious activities by privileged insiders, potential hackers, and end-users of enterprise applications such as Oracle EBS, PeopleSoft, SAP, BI, and in-house systems. At the same time, Guardium optimizes operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure. URL: http://www.guardium.com
Reflex Systems Reflex VMC Virtualization Managemen t, Security & Compliance Reflex VMC integrates security, compliance and management of the virtual environment by providing visibility, correlation, and control. This enables IT to manage the virtual enterprise based on existing organizational business processes and leverage virtualization to do things that were simply not possible in the physical data center. VMC: Management through a Single Pane of Glass Change Control & Configuration Monitoring Virtual Infrastructure Discovery & Mapping Software Asset Management Virtual Security (FW/IDS/IPS) CPU, Memory, Network & Storage Performance Timeline & Alerts for Audit & Compliance Virtual Infrastructure Alarms & Alerts URL: http://www.reflexsystems.com Catbird vsecurity Catbird s vsecurity provides comprehensive security solution for VMware. Fully leveraging virtualization s architectural elegance, the Catbird vsecurity offers the broadest and most cost-effective security protection for virtual networks of all sizes. This includes: VIM Virtual Infrastructure Monitoring Vulnerability Management IPS/IDS NAC URL: http://www.catbird.com
Check Point Full Disk Encryption Automatic encryption of laptop and desktop hard drives protects critical information and prevents corporate data breaches. Check Point Full Disk Encryption provides the highest level of data security with multi-factor pre-boot authentication and the strongest encryption algorithms. The entire hard drive contents - including the operating system and even temporary files - are automatically encrypted for a completely transparent end-user experience. Benefits: Protects corporate information from unauthorized access and prevents costly data breaches when laptops are lost or stolen Fast compliance with the highest security certifications - FIPS 140-2, Common Criteria EAL4 and BITS Comprehensive platform support including Windows 7, Mac OS X 10.6 (Snow Leopard) and Linux Highly scalable proven in data security deployments of more than 200,000 seats Rapid deployment as fast as 50,000 seats per month Trusted, market-leading data security 9 years in a row in the Leaders Quadrant of the Gartner Magic Quadrant for Mobile Data Protection FIPS 140-2. URL: http://www.checkpoint.com Check Point Media Encryption Check Point Media Encryption secures sensitive corporate data and blocks incoming malware by encrypting removable media such as USB storage devices, CDs and DVDs and controlling activity (read, write and execute) on ports and devices. All device content is automatically encrypted in the background for a transparent end-user experience. Unique to Check Point, users can access encrypted media securely on unmanaged computers with no client installation Benefits: Comprehensive control of endpoint ports and protection of corporate data stored on removable media and devices Transparent end-user experience with automatic data encryption and seamless integration with Windows CD/DVD wizard and Nero 9 Simplified administration and operation with single agent installation, centralized management, and central policy enforcement Integrated endpoint and network security capabilities including centralized logging of data movement and media usage for streamlined compliance and forensic analysis. URL: http//www. checkpoint.com
Websense Data Security Suite Websense Data Security Suite, the leading data loss prevention (DLP) solution, accurately prevents data loss, secures business processes, and manages compliance and risk by identifying your confidential data, monitoring it s use, discovering where it s stored, and protecting it, on the network and at the endpoint. Data Security Suite is tightly integrated with Websense Web security and email security solutions, supporting enforcement that is built-in or supported via third-party integration. Websense Web Security Gateway Websense Data Security Suite is managed by Websense TRITON Console, which integrates reporting and management of Websense data loss prevention and Websense Web security solutions into a single unified console. The TRITON Console also provides reporting and management of individual Websense data security solution modules. URL: http://www.websense.com Websense Web Security Gateway solutions are the industry s leading secure Web gateway solutions, providing the best protection against modern Web threats at the lowest total cost of ownership. They are the only solutions to provide enterprise-class data loss prevention and unified management of hybrid onpremise/security-as-a-service (SaaS) deployments. Secure Web gateway solutions enable organizations to leverage the power of Web 2.0 without worrying about malware, inappropriate content, employee productivity, or disclosure of sensitive information. URL: http://www.websense.com Websense Email Security Websense Email Security software incorporates multiple layers of real-time Web security and data security intelligence to provide leading email protection from converged email and Web 2.0 threats. It helps to manage outbound data leaks and compliance risk, and enables a consolidated security strategy with the trusted leader in Essential Information Protection. Blocks inbound and outbound email threats at the network gateway Guards against blended threats Granular policy control and reporting Protects confidential data within email and attachments URL: http://www.websense.com
ActivIdentity 4TRESS AAA CMS Smart Display Card ActivIdentity provides two distinct strong authentication platforms for organizations that are seeking to implement a cost-effective, flexible, and scalable solution: ActivIdentity 4TRESS AAA Server for Remote Access addresses the security risks associated with a mobile workforce accessing systems and data remotely. ActivIdentity 4TRESS Authentication Server offers support for many authentication methods (e.g., user name and password, knowledge-based authentication, one-time password, and public key infrastructure [PKI] certificates) and diverse audiences across a variety of service channels, making it the preferred versatile authentication platform for customer-facing transactions ActivIdentity offers a broad range of authentication devices that all interoperate with its Strong Authentication and Credential Management products. ActivIdentity Authentication Devices range from Smart Cards, Smart Card Readers, Smart USB Tokens, OTP Tokens, DisplayCard Tokens, and Soft Tokens to Hardware Security Modules. SecurEnvoy SecurAccess URL: http://www.actividentity.com SecurAccess from SecurEnvoy turns any mobile phone that can receive SMS into a ready-made authentication device. This pioneering zero-footprint solution cuts costs by using hardware you already own. Unlike traditional tokens that take months to deploy and replace, SecurAccess can roll out more than 15,000 new remote staff per hour without the pain, cost or environmental impact created by legacy hardware distribution. Strong, affordable, convenient two-factor authentication No password reset or PIN management issues No token/smartcard deployment, renewal or replacement costs No additional devices, no software required on the phone Passcode always available even if temporarily out of communication URL: http://www.securenvoy.com
SecurEnvoy SecurMail SecurMail enables individuals to send and receive email across the internet using standards based https and strong two-factor authentication of the recipient. By requiring two different forms of identification, you can make sure that the emails intended recipient is the only person who can read the mail Benefits No need to enroll or agree in advance to receive sensitive data No additional devices or passwords required by the recipient Compatible with any recipient email environment Guaranteed notification that the email has been received Doesn t get blocked by virus scanners and works with webmail. URL: http://www.securenvoy.com etouchware Safe-T Safe-T is an innovative all-in-one,secure Managed File Transfer (MFT) solution that is poised to revolutionize the way that data are conveyed. The Safe-T Solution offers simple, convenient, and secure managed file transfer both inside and outside the enterprise. Benefits: Intuitive file transfer from within Outlook or web interface No size limit in sending files or folders Tightly secured file transfer including secured links, password protection, file encryption, tracking, and DMZ front-end Secure file return from external users (partners, suppliers, customers) with no need to install any software or set up an account Powerful and flexible management capabilities, including users, permissions, reporting, and audit-trail functions The ability to mesh easily and completely with your existing infrastructure with no disruption Up and running within hours Deployed quickly and cost-effectively in single site, multisite, or distributed enterprise configurations Multiple security and audit trail capabilities to meet industry and governments regulations (SOX, HIPAA, FDA, and more) URL: http://www.safe-t.com
InnoVAD Solutions Ltd. (Formerly, BeSecured Information Technologies) is a value-added distributor of end-to-end solutions in the fields of networking and information security. The company is a member of the Forum Group (www.forum-group.com). Established in 2005, InnoVAD Solutions is committed to distributing unsurpassed products and solutions that will enable the highest sustainable margins for our business partners. InnoVAD provides a broad range of end-to-end solutions in the field of data and voice networks, IP Tel, network security, data security, virtual infrastructure management and security, database security, endpoint security, authentication and compliance. InnoVAD Solutions distributes its products through business partners comprising of leading integration and information security companies. Our business partners play a key role in our continued growth and success. InnoVAD Solutions is the first company in Israel to fully implement a model of Value-Added Distribution (VAD). InnoVAD Solutions is committed to the highest standards of business and channel excellence in all dealings with our reseller and vendor partners.