Starting from the authentication/security solution,
of developing and selling the solution of access control of network, authentication, and security for the past 12 years.
has been in the business
Certes Networks offers the new generation of security,
for companies who want to gain all the efficiency
and competitive advantage of modern IT,
without putting themselves or their customers at risk
is the first user-aware and application-aware solution for protecting sensitive applications for any authorized user on any network. It is the industry’s first software-defined security product focused solely on crypto-segmentation of your applications, enabling them to be shared.
CryptoFlow Net provides the ultimate flexibility for protection of data in motion. The software version of Certes’ real-time traffic enforcers can be easily deployed on a third-party device such as a server or gateway, providing a wide range of deployment options for protecting your sensitive data in motion.
“Cisco security innovations provide highly secure firewall,
web, and email services while helping to enable mobility
Intrusion Prevention System
The Cisco FirePOWER Next-Generation IPS (NGIPS) solution sets a new standard for advanced threat protection by integrating:
• Intelligent security automation
• Real-time contextual awareness
• Superior performance with industry-leading network
Cisco Advanced Malware Protection
Prevent breaches, continuously monitor for malicious behavior on your network, and rapidly detect and remediate the most advanced malware.
Get advanced threat defense, advanced malware protection, application visibility and control, insightful reporting, and secure mobility. The Cisco Web Security Appliance (WSA) combines all of these forms of protection and more in a single solution. The WSA also helps to secure and control web traffic, while simplifying deployment and reducing costs.
Keep your critical business email safe from spam, malware, and other threats. Our industry-leading solution gives you faster, more complete email protection to stop email-based threats and provide continuous protection before, during, and after an attack.
Proactive Security through Effective Management for Enterprises,
Governments and Service Providers
We provide single UI for unified security policy
is an IAM Solution which integrates
HI-TAM (Access Management Solution)
HI-DBAM (Database Access Management Solution)
HI-TIM (Identity Management Solution)
HI-DBIM (Database Identity Management Solution)
built and enhanced with years of
experience by the best engineers.
an Access Management system which effectively controls remote access to network/server infrastructure, individual account authority & executable commands, allows for real time monitoring of user activity, and generates system log for individual user activities on the server.
A Database Access Management system which effectively controls remote access to network/server infrastructure, individual account authority & executable queries, allows for real time monitoring of user activity, and generates system log for individual user activities on the server.
HI-TIM centralizes and manages user data from heterogeneous systems. Some features include account life cycle management (generation/ deletion), inactive or illegal account detection/lock/administrator notification. Password policies can be set to enforce update rules, and auto/semi-auto login features prevents password leaks.
HI-DBIM centralizes and manages user data from heterogeneous DBMS. Some features include account life cycle management (generation/ deletion), inactive or illegal account detection/lock/administrator notification. Password policies can be set to enforce update rules, and auto/semi-auto login features prevents password leaks.
Experience by the best engineers
"THE LEADER IN INSIDER
THREAT DETECTION &
USER BEHAVIOR ANALYTICS"
ObserveIT Insider Threat Management
ObserveIT is the global leader in Insider Threat Management. ObserveIT helps over 1,200 customers worldwide detect insider threats and stop data loss. ObserveIT‘s award-winning insider threat software combines best-of-breed user monitoring, advanced behavior analytics, security policy enforcement and irrefutable video forensics. ObserveIT’s agent-based approach installs in minutes and provides visibility and prevention of Insider Threats by adding behavioral context not readily available in log files and stopping malicious or careless activity that puts the business at risk.
ObserveIT's award-winning insider threat management software
is complete with
ObserveIT can be deployed in under one hour.
Less than 1% CPU,
only at the
point of capture
100 MB per user,
Leading Technology in Asia
For network security and optimization solutions
Sangfor Internet Access Management
Sangfor SSL VPN
“The Best Solution for Your Wide Area Network”
The Leading Network Monitoring
& Security Company
Savvius builds software and hardware products
for network and security professionals.
Maintaining and troubleshooting networks
requires great tools.
Savvius Vigil is the first network appliance able to intelligently store months of packet-level information to enhance security investigations. With Savvius Vigil, packets related to a breach can be examined weeks or months after the incident occurs. This information is often vital to a full understanding of the threat.
The newest and smallest addition to the Omnipliance family of network monitoring appliances. Savvius Insight has no moving parts, connects inline to the network with two bypass ports, and has three extra ports for span port captures.
Leader in Network Access Control ViaScope
Agentless Network Access Control
with Secure DHCP Server
IPScan XE Major Functions
Layer 2 Access
Providing advanced DHCP server features
Centralized IP/MAC Management, Agentless network access control,
Built-in advanced DHCP Server