-
Datasheet: Astaro Security Gateway
11/25/2009
Astaro Security Gateway integrates complete Network, Web and Mail Security through an intuitive browser-based user interface. The Astaro Unified Threat Management appliance is the most easy-to-use and cost-effective "all-in-one" solution available, working to effectively shield businesses from internet based threats everyday.
-
Kaspersky Anti-Virus For Linux Workstation
11/24/2009
Kaspersky Anti-Virus for Linux Workstation is a two-part solution designed to protect workstations. The first module, the on access protection, is integrated with the operating system and checks file modified files (either new or amended files), thereby ensuring real-time protection of the system without significantly increasing server load.
-
Kaspersky® Mail Gateway
11/25/2009
Kaspersky Mail Gateway is a versatile solution that provides full-scale protection for mail system users against viruses and unsolicited emails (e.g., spam).
-
AXIS M1114 Network Camera
6/8/2010
The AXIS M1114 offers a professional and affordable fixed camera suitable for a wide range of video surveillance applications, such as for retail and banking as well as libraries and other office buildings.
-
Hosted CanIt Anti-Spam
11/25/2009
Hosted CanIt® automatically protects email from Spam. Ads, fraud schemes, porn, viruses, phishing attempts... if it's junk e-mail, Roaring Penguin's Hosted CanIt will stop spam before it reaches your mail server without the need for installing any software or hardware.
-
Datasheet: WatchGuard SSL
11/24/2009
The WatchGuard® SSL 100 is an affordable, easy-to-use, secure remote access solution providing reliable client and clientless connectivity to corporate data and resources, such as email, file shares and CRM. This all-in-one appliance offers the flexibility to provide basic access to networks with an auto-loading client, as well as more sophisticated access to web-based resources and non-native applications including SSH and RDP.
-
PacketSure Managed Data Loss Prevention™
11/25/2009
Organizations large and small share the same requirement: to keep sensitive and confidential information from leaving their networks. Small organizations however, are presented with limited funds for capital expenditures and information technology teams are stretched thin, which creates a barrier to deploying and managing additional technology.