2020-04-27T13:20:58+00:00
- Detect changes in real time and differentiate authorized from unauthorized changes—then prioritize response based on business context.
- Discover assets and scan for vulnerabilities with granular risk scoring to prioritize the most urgent business risks.
- Reliably collects, normalizes, analyzes and stores log data for immediate alerting of suspicious behaviors and to support detailed forensic analysis.
- Keep configurations in a known and trusted state and identify and remediate non-compliant changes using our nearly 800 policy/platform combinations.
- Network and Data Security.
- Security Policy Management and Enforcement.
- Security Compliance.
2020-05-07T13:14:13+00:00
- Enterprise Mobility Management.
- Mobile Device Management.
- Secure Mobile Email/Apps/Content.
- Enterprise Mobility Management Platform.
- Cloud Security with MobileIron Access.
- Windows Security with MobileIron Bridge.
2020-04-27T13:24:17+00:00
- Trend Micro enterprise security suites deliver adaptive threat protection and data security tailored to meet your specific security needs. With a single, centrally managed suite, you will reduce costs, increase visibility, and close the security gaps across the layers of your IT environment.
- High-performance endpoint security suite protects virtual and physical desktops against today’s evolving threat landscape using the broadest range of anti-malware techniques available to stop ransomware and other attacks.
- Deep Discovery Inspector is a physical or virtual network appliance that monitors 360-degrees of your network to create complete visibility into all aspects of targeted attacks, advanced threats, and ransomware.
- Through use of extensive detection techniques, monitoring of all network activity, custom sandbox analysis, and correlated threat intelligence.Deep Discovery Inspector can detect and analyze malware, command and control (C&C) communications, and evasive attacker activities that are invisible to standard security defenses.
- Smart Protection for Endpoints.
- ScanMail Suite for Exchange.
- Deep Discovery Inspector.
2020-05-07T13:04:16+00:00
- Automate and centralize DNS management.
- DNS Traffic Control.
- Internal DNS Security.
- External DNS Security.
- DNS Firewall.
- DNS Firewall.
- Advanced DNS Protection.
- ActiveTrust Cloud.
- ActiveTrust.
- Network Insight.
- DNS Traffic Control.
2020-05-07T13:43:09+00:00
- Collaboration
- Data Center
- Network Architecture
- Mobility
- Routers
- Servers – Unified Computing
- Switches
- Unified Communications
- Video
- Wireless
2020-06-24T13:47:40+00:00
- Data Classification
- Data Discovery
- Automatic data classification
- Data Classification, Classifier Components
- CAD Classifier
- Box Classifier
- Exchange Classifier
- Mac Classifier
- OWA Classifier
- SharePoint Classifier
- Classifier Reporting
- Mobile Classifier
- Mobile Filter
2020-05-07T12:45:13+00:00
- Servers and Storage
- Data Protection
- Cloud Computing
- Converged Infrastructure
- Endpoints
- Dell PowerEdge VRTX. PowerEdge VRTX servers, storage.
- Dell back-up, protection and consolidation.
- Data center infrastructure.
- EMC storage, Protection and Archiving.
2020-05-07T13:26:57+00:00
- Cloud Security for Web & Email.
- Insider Threat Data Protection.
- Cloud App Security.
- Multilevel Security Compliance.
- Office 365™ Security.
- Forcepoint Email Security.
- Forcepoint Web Security.
- Forcepoint DLP.
- Forcepoint DLP Endpoint.
2020-05-07T10:34:50+00:00
- VMware industry-leading virtualization platform with intelligent operations management, purpose-built to get the best performance, availability and efficiency out of your environment.
- NSX embeds security functions right into the hypervisor. It delivers micro-segmentation and granular security to the individual workload.
- Applications and data can reside and be accessible anywhere, Because NSX abstracts networking from the underlying hardware and attaches networking and security policies to their associated workloads.
- NSX treats physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach. This automates networking operations and eliminates bottlenecks associated with hardware-based networks.
- SDDC Platform.
- vSphere with Operations Management.
- vSphere.
- NSX.
- vRealize Network Insight.
- vSAN.
- Site Recovery Manager.
- vSAN ReadyNode.
2020-05-07T12:59:04+00:00
- Veeam® enables Disaster Recovery-as-a-Service (DRaaS) as part of a comprehensive availability strategy, embracing investments made in your datacenter.
- Veeam® delivers enterprise scalability with solutions for Hyper-V backup and management of your physical and virtual environment.
- Together, Veeam® and VMware save time and money while reducing risk for your organization. Veeam provides full VMware vSphere 6.6 support.
- Availability for the Always-On Enterprise.
- Veeam Availability Platform.
- Veeam Backup for Microsoft Office 365.
- Disaster Recovery Orchestration.
- Veeam Availability Orchestrator.
- Veeam Availability Console.