Comguard E-Brochure

Page 1

Coporate Office:

P.O.Box 500182, Dubai, U.A.E BB2, Floor No 29, Mazaya Business Avenue, Jumeirah Lakes Towers, Dubai U.A.E [T] +971 4 457 6500 [F] +971 4 457 6599 [E] info@comguard.net / support@comguard.net

www.comguard.net Overseas Offices: SAUDI ARABIA Al Mosa Building, Showroom No.2, Next to Air Arabiya and Mobily Office South of Kingdom Centre, Olaya Dist, Riyadh, Kingdom of Saudi Arabia [M] +966 502792684 [T] +966 1 461 1997 [F] +966 1 461 1377 INDIA MBC Centre, Ground Floor, 143/A Ghodbunder Road Opp. Cine Wonder Mall, Kapur Bawdi, Thane, Mumbai, Maharashtra - India 400607 [T] +91 22 61934800 [F] +91 22 61934801 [E] info@comguard.in


CONTENTS SPECTRUM GROUP pg 01 COMGUARD OVERVIEW pg 02 PRODUCT OVERVIEW - KASPERSKY pg 03 PRODUCT OVERVIEW - WATCHGUARD pg 05 PRODUCT OVERVIEW - GFI pg 07 PRODUCT OVERVIEW - GATEPROTECT pg 09 PRODUCT OVERVIEW - SAFENET pg 11 PRODUCT OVERVIEW - TRIPWIRE pg 13 PRODUCT OVERVIEW - NETSWEEPER pg 15 PRODUCT OVERVIEW - CLAVISTER pg 17 PRODUCT OVERVIEW - BEYONDTRUST pg 19 PRODUCT OVERVIEW - HP | DAMBALA pg 21 PRODUCT OVERVIEW - WILDPACKETS | ENTUITY pg 23 PRODUCT OVERVIEW - COURION | IXIA pg 25 PRODUCT OVERVIEW - BLUECAT | DELPHIX | WINMAGIC pg 27 PRODUCT OVERVIEW - ARRAY NETWORKS | ACUNETIX | AIRTIGHT | PING IDENTITY

pg 29

PRODUCT OVERVIEW - NSFOCUS | FIXMESTICK | EC-COUNCIL pg 31 WIRELESS PRODUCT OVERVIEW pg 33 WIRELESS PRODUCT OVERVIEW - CAMBIUM | ENGENIUS pg 34 WIRELESS PRODUCT OVERVIEW - ALTAI | MERU NETWORKS | AIRLIVE | 4IPNET

pg 35

COMGUARD INITIATIVES, CUSTOMERS LIST pg 37 COMGUARD SUPPORT, SERVICES and STRATEGY

pg 38

COMGUARD INDUSTRY RECOGNITION | PARTNER APPRECIATION

pg 39


The Spectrum Group

Spectrum Group was incorporated in the year 2004 in Dubai Internet City, since then Spectrum has emerged to be a pioneer in empowering organizations through its knowledge transfer services, professional services, consultancy services and as a value added distributor of IT Network and Security products and solutions, by leveraging on its inherent strength in infrastructure, excellent subject matter experts and excellent customer support capabilities. Today, Spectrum is most preferred by some of the world class networking, wireless, supply chain and IT security vendors. The excellence in professional services, supply chain management solutions and training services has gained Spectrum to be chosen by most prestigious organization such as Microsoft, Juniper Networks, Motorola, Infor, Kaspersky, GFI, EC-Council, HP Enterprise Security (ArcSight, Fortify and Tipping Point), Safenet, Array Networks, Bluecat, Airtight, WinMagic, Tripwire, nCircle, Ixia, Beyondtrust, Entuity, Wild Packets, Courion, NSfocus, Delphix, Damballa, Gateprotect, Clavister, WatchGuard, Acunetix etc. to represent their technical efforts in various nations. Spectrum Group of companies has won many accolades such as “Spectrum Training won Excellence in Training Awards from Juniper Networks VAR Middle East chose Comguard FZ LLC as the Emerging Company of the year 2008, Best Overall Partner by Kaspersky Labs in 2008, and Comguard Networks recognised as Top 5 VAD’s in India by SME India 2012 etc. Owing to its successful journey in in Middle East and Africa region, Spectrum Networks Solutions was launched in India in the year 2008, with intent to provide reach in Asia-Pacific Region. Spectrum Networks Solutions has created a niche in the training space and quickly gained industry recognition and high profile customers over the last few years. Spectrum is also renowned for its leading Professional services which aligns businesses and helps them to grow with their share of expertise in the area of System and Network infrastructure. Integrated Solutions for Supply chain management is one of the major aspects of Spectrum, having a solid base of high profile customers. Spectrum Networks have paved its way in delivering services for Enterprises and has successfully emerged as a System Integrator for Supply Chain Management in the APAC Region. The system integration division caters end-to-end mobility solutions for effective operational growth of the enterprises by accelerating their productivity. Spectrum Group is a synergy of Spectrum Training FZ LLC, Spectrum Networks Solutions (India). ComGuard FZ LLC and ComGuard Infosol (India) and Psilog International FZ LLC. Spectrum has taken quantum leaps in establishing itself as a one of the leading players in the Systems, IT Network Security and Supply Chain arena encompassing core technologies and tailoring them towards meeting discerning customer needs. Team Spectrum is all poised to extend uncompromising quality in delivering Technical Education, Consultancy and Infrastructure Services in Asia-Pacific region as it moves ahead.

1

2


About KASPERSKY ENDPoINt SECuRItY FoR buSINESS ComGuard IT professionals remind us every day that their occupation is becoming increasingly difficult. WHICH TIER IS RIGHT FOR YOU?

The job has always been hard, but now the level of complexity across the network and connected devices seems out of control. There is often frustration over the lack of resources, shrinking budgets, and users who take your policies to the limit. Once stationary, IT professionals remind us every day that their occupation is becoming data has now migrated across multiple systems, smartphones and tablets and is often increasingly difficult. located in coffee shops, airplanes and left behind innow taxis. Andofofcomplexity course,across application The job has always been hard, but the level the network and patching to stop vulnerabilities has become a full-time job (that is if you can ever connected devices seems out of control. There is often frustration over thereally lack of know resources, shrinking budgets, and users who take your policies to the limit. Once stationary, has now which applications are being used). This complexity has forced some organizations to data make migrated across multiple systems, smartphones and tablets and is often located in coffee shops, security compromises. airplanes and left behind in taxis. And of course, application patching to stop vulnerabilities has become a full-time job (that is if you can ever really know which applications are being

You need a new, uncomplicated waY has to forced dealsome with these changes and threats. used). This complexity organizations to make security compromises.

You need a new, uncomplicated way to deal with theseEndpoint changes and threats Administrators can see, control and protect their IT environment with Kaspersky Security for Administrators canbalanced see, control and progressive protect their tiers IT environment with Kaspersky Endpoint Business. Tools and technologies are uniquely across to meet your evolving security Security for Business. Tools and technologies are uniquely balanced across progressive tiers and IT needs. Kaspersky can make your job easier.

Collaboration

Mail

Web

License Management

Network Admission (NAC)

Software Installation

Imaging/Provisioning

Patch Management

Vulnerability Scan

Data Protection (Encryption)

Select

Mobile Endpoint Security

Mobile Device Management (MDM)

File Server Security

Core

Application Control

Device Control

Web Control

Kaspersky Security Center

Advanced

Total

to meet your evolving security and IT needs. Kaspersky can make your job easier.

Anti-Malware + Firewall Endpoint

Management

Infrastructure

Kaspersky boasts a comprehensive list of technologies — all working together from the same codebase and further Kaspersky a comprehensive list of technologies working together from the same codebase assisted by the boasts cloud-based Kaspersky Security Network — — to all give our customers the world-class protection and they need.

further assisted by the cloud-based Kaspersky Security Network — to give our customers the world-class

protection they need. In short, we’ve delivered the industry’s first Security Platform, built from the ground up, making it easy for you to see, control and protect your world.

KASPERSKY ENDPOINT SECURITY FOR BUSINESS, CORE Starting from a foundation of Kaspersky’s award-winning and powerful workstation anti-malware protection and a firewall, we add Kaspersky Security Center — our intuitive administration console. For customers who require anti-malware only, this is the solution. KASPERSKY ENDPOINT SECURITY FOR BUSINESS, SELECT Workstation & File Server Security, Application Whitelisting and Control, Device Control and Web Control form the protection roster of the Select tier. Also included is a mobile protection solution which consists of an endpoint security agent and Mobile Device Management (or MDM). If your needs include protecting a mobile workforce and enforcing IT policy, SELECT might be the right tier for you. KASPERSKY ENDPOINT SECURITY FOR BUSINESS, ADVANCED At the ADVANCED tier, Kaspersky adds data protection in the form of file or full-disk encryption. Another new offering, Kaspersky Systems Management, combines security with IT efficiency. This broad set of features includes essential tools allowing the administrator to: • Create and store images and remotely deploy systems. • Prioritize the treatment of hardware and software vulnerabilities with a powerful combination of advanced Vulnerability Scanning and intelligent Patch Management. • Track license usage and compliance with Software License Management. • Set data and infrastructure access policies for users and guests with Network Admission Control (NAC). • Deploy and install updates and new software to users remotely from the central console. KASPERSKY TOTAL SECURITY FOR BUSINESS Our flagship offering, Kaspersky Total Security for Business, combines all previous tiers and further enhances your security posture with additional Web, Mail and Collaboration Server protection. This is the perfect solution for organizations with broad security requirements who demand the best protection for each network level. KASPERSKY ENDPOINT SECURITY FOR WINDOWS WORKSTATIONS Business changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures - but these trends pose critical and dangerous malware risks to the organization. Kaspersky enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends. As a cornerstone of Kaspersky’s solutions, Kaspersky Endpoint Security for Windows provides centralized protection of Windows workstations and Windows servers from malware, potentially dangerous programs and network attacks. KASPERSKY ANTI-VIRUS FOR WINDOWS SERVERS Modern corporate networks are complex systems that typically consist of terminal servers, server clusters and other types of nodes. Infrastructure like this demands the highest levels of protection, with file servers requiring dedicated software that won’t just protect data from the latest malware, but will also provide uninterrupted performance under the heaviest load conditions with minimal effect on network efficiency. Kaspersky Anti-Virus for Windows Servers has been developed specifically for networks like this, making it easy to protect your most valuable business resources today and in the future. In modern heterogeneous networks, a single virus can spread very quickly as it is virtually impossible to isolate a newly detected network infection immediately. Corporate users often place various files into file storages, thus exposing all nodes on the corporate network to risk, from workstations to shared file storage facilities.

In short, we’ve delivered the industry’s first Security Platform, built from the ground up, making it easy for you to see, control and protect your world.

3

4


ComGuard

Since 1996, WatchGuard® Technologies, Inc. has been the advanced technology leader of business security solutions, providing mission-critical protection to hundreds of thousands of businesses worldwide. WatchGuard family of wired and wireless unified threat management appliances, messaging, content security, access points and SSL VPN remote access solutions delivers enterprise-grade network protection for small to midsize businesses, keeping your network secure, employee productivity high, and turning the Internet from a security risk to a business empowerment tool. WatchGuard is headquartered in Seattle, Washington, with offices in North America, Latin America, Asia Pacific and Europe. WatchGuard eXtensible Threat Management (XTM) - Next-Generation Network Security The XTM family of next-generation network security appliances are best-in-class, performancedriven solutions. Blazing fast throughput combines with advanced networking features to handle high-volume traffic securely. The XTM Solutions Includes a suite of flexible management tools that allows IT administrators to manage security through an intuitive centralized console, command line interface, and web UI. There are multiple models to provide gateway security for businesses of all sizes, from mid-size to Enterprise levels WatchGuard’s Next-Generation Firewall WatchGuard next generation firewall is an enterprise-class, high-performance gateway security appliance that provides top-of-the-line firewalling, intrusion prevention, and application control. WatchGuard’s NGFW products provide true line-speed security inspection on all traffic and support multi-gigabit packet filtering throughput. In addition, the NGFW connects offices via unique drag-and-drop VPN; connects people via SSL and IPsec VPN; and gives the enterprise unparalleled visibility into real-time and historical user, network, and security activities. WithWatchGuard’s NGFW, businesses can define, enforce, and audit strong security and acceptable use policies, resulting in increased employee productivity and less risk to critical intellectual property or customer data. Key Next-Generation Firewall Characteristics: High performance security inspection that blocks attacks and unwanted traffic without hindering mission-critical Internet usage. Best secure throughput in its class, with a very broad feature set and the best real-time visibility tools. Supports over 1,800 applications, more than any other Next-Generation Firewall. Standard Firewall Capabilities: Packet Filtering, Network Address Translation(NAT), Stateful Protocol Inspection, Virtual Private Networking(VPN). Integrated Network Intrusion Prevention (IPS) Application Awareness and Control Additional Intelligence: Directory integration to tie security policies to users and groups; cloud-based reputation services to stop traffic from dangerous sources Real-time and historical visibility into user, network, and security activity Security Features

Stateful packet firewall, deep application inspection, application proxies: HTTP, HTTPS, SMTP, FTP, DNS, TCP, POP3 Blocks spyware, DoS attacks, fragmented packets, malformed packets, blended threats and more Protocol anomaly detection, behavior analysis, pattern matching Static and dynamic blocked sources list VoIP: H.323 and SIP, call setup and session security

User Authentication

Security Subscriptions

Available in 1-year or 3-year subscriptions Application Control Intrusion Prevention Gateway AntiVirus WebBlocker spamBlocker Reputation Enabled Defense Buy an XTM Bundle and get your choice of appliance with a support and maintenance contract, plus all security subscriptions at a great price

Transparent Active Directory Authentication (single sign-on) XAUTH for RADIUS, LDAP, Secure LDAP, Windows Active Directory RSA SecurIDÂŽ and VASCO Web-based, local 802.1X for XTM 2 Series wireless Microsoft Terminal Services and Citrix environments supported

5

Management Software

All WatchGuard XTM appliances can be managed with the IT administrator’s choice of: Command line interface with direct connects and scripting Web UI for single device management from anywhere WatchGuard System Manager (WSM): intuitive, centralized console providing interactive real-time monitoring and logging for network-wide system status at a glance. Includes drag-and-drop VPN creation and rich historical reporting

Logging and Reporting

Multi-appliance log aggregation HTML and PDF reports SQL log database Encrypted, TCP-based log channel SNMP v2 & v3 Syslog Logging and reporting with server health status Web-based configurable reports portal

Extensible Content Security (XCS) Appliances-- Email and Web Security with Data Loss Prevention WatchGuard XCS (Extensible Content Security) solutions, deliver the industry’s most effective defense- in-depth solution for email security, web security and data loss prevention. These easyto-use, all-in-one solutions offer the most effective defense from email and web-based threats including spam, viruses, malware, URL filtering, blended threats, spyware and network attacks. Choose from six different models to suit the unique messaging security requirements ranging from small business to the most demanding enterprise email and web networks. Stronger Security With Multi-Protocol Protection WatchGuard XCS appliances deliver unprecedented email security and web application security as well as control of traffic entering and exiting your email and web networks. Protect your network’s perimeter with a combination of defenses: WatchGuard ReputationAuthority “in-the-cloud,” real-time monitoring service to block over 98% of unwanted traffic and threats with 99.9% accuracy Advanced Anti-spam and Malware Prevention Engines for URL filtering on HTTP and HTTPS Zero-Hour Threat Outbreak Response for the fastest response to new threats Always-On Email Security so you never lose a message Set-It-And-Forget-It Administration with the ability to apply a single policy to control traffic Granular Reporting for visibility into security gaps and customizable reporting for audit requirements WatchGuard XCS Appliances Features: Encrypt Emails for Privacy and Compliance / Effectively Define Your Relationship with the Internet / Eliminate Spam and Emailborne Threats / Extend Protection to Web Traffic / Stop the Loss of Sensitive Data / Protection for Web Traffic / Enterprise-Grade Reliability / Centralized Management and Reporting / WatchGuard Quarantine Management Server (QMS) / Next-Generation AntiSpam Technology / Protection from Email-Borne Threats / Data Loss Prevention (DLP) / Email Encryption with XCS Secure mail The WatchGuard® SSL 100 & 560 are affordable, easy-to-use, secure remote access solutions providing reliable client and clientless connectivity to corporate data and resources, such as email, file shares and CRM. These all-in-one appliances offer the flexibility to provide basic access to networks with an auto-loading client, as well as more sophisticated access to web-based resources and non-native applications including SSH and RDP. The SSL 100 & 560 appliances offer advanced security features including integrated strong authentication and rich endpoint integrity checking. Desktop sharing features allow your helpdesk to fix a remote employee’s computer problems, so users stay productive from anywhere, anytime. WatchGuard Access Point The right product for businesses that require the flexibility of separate UTM and wireless hardware platforms while retaining single management console ease of use.One or many AP devices can be combined with a new or existing XTM device to extend UTM security to the WLAN.Separate wireless access points allow flexible deployment options. XTM appliance can be rack-mounted, while AP devices are located elsewhere in the office, extending coverage away from the XTM. Omni-directional internal antennas, plenum enclosure option, subtle design and PoE make the AP perfect for deployment in public spaces. Securing Your Virtualized World :XTMv & XCSv

Organizations of all sizes are turning to virtualization to reduce costs and increase the efficiency, availability, and flexibility of their IT resources. But virtualization comes at a cost. Virtual environments are complex to manage and vulnerable to security threats. IT must be prepared. Now applications can be secured, resources can be maximized and your IT department can reap the rewards of having a single, unified management system—without a security risk in sight. WatchGuard XTMv brings best-in-class network security to the world of virtualization. With real-time monitoring, multi-WAN support and scalable solutions to fit any sized business, your virtual environments can be just as secure as your physical one.

XTMv Virtualize the traditional gateway firewall for unprecedented flexibility –protecting the internal edge. WatchGuard XTMv protects not only the physical perimeter of the datacenter, but the “virtual edge.” Now you can easily implement policy that protects the data in the corporate database from the messaging infrastructure, or confidential HR information from financial data from other divisions – even when running on the same servers. Consolidate multiple firewalls for high-impact efficiencies – multi-tenant protection Service providers – hosting, cloud, or managed security services – can deploy multiple instances of XTMv on servers at the perimeter of their datacenters.

XCSv Integrate with messaging and application servers for stronger protection – privatenetwork deployment Among the most popular applications that organizations have chosen to implement within their virtual environments are messaging and web application servers; surveys of IT organizations consistently place Microsoft Exchange at or near the top of the list of virtualized services. Deploying XCSv virtual appliances within the same virtualized infrastructure allows content security on the same physical servers to be connected to the email and web servers using private networks, insulating all traffic from the public Internet. Consolidate multiple security appliances for custom security – multi-tenant protection. Service providers – email hosting, cloud, or managed security services – can deploy multiple instances of XCSv in virtualized environments on shared industry standard servers within their datacenters.

6


ComGuard

Archiving, Backup & Fax

Network and Security

Web & Mail Security

– Anti Spam Edition

– Email Security Edition

Simple IT management Manage, monitor and secure your network with GFI Cloud.GFI Cloud gives you control of your IT environment in 10 minutes or less. Whether you have 5 or 500 employees, its simple web-based interface offers integrated antivirus, asset and network management across your workstations and servers. With an expanding range of award-winning software services, GFI Cloud provides a single integrated solution to streamline IT management.

7

GFI MailEssentials Online™ is a comprehensive hosted email security and spam filtering service that is extremely easy to deploy and maintain. As a cloud-based service, GFI MailEssentials Online uses top-notch hosted spam filtering and multiple email security technologies to block 100% of viruses and over 99% of junk mail before they can enter your network. Its built-in continuity features allow you uninterrupted access to email even when your mail server is offline. In addition, an optional integrated archive service securely retains your important email messages for subsequent search and retrieval.

8


www.gateprotect.com www.gateprotect.com

ComGuard

CUTTING-EDGE SECURITY FEATURES The changing network security requirements of the market mean that companies demand the next generation of security systems to meet the challenge. gateprotect combines a wide range of the most modern and innovative security functions in a single system, the gateprotect “Next Generation UTM Firewall Appliances”.

www.gateprotect.com

NeXt GeNerAtioN utM FirewALL NeXt GeNerAtioN utM FirewALLAPPLiANceS APPLiANceS NeXt GeNerAtioN utM FirewALL APPLiANceS Next Generation utM Next Generation utM

gateprotect AG, Germany has been a leading, globally acting provider of IT security solutions in the area of network security for more than 10 years. These solutions comprise next generation firewalls withGPo all100 commonly GPo used UTM functions, 150 GPA 300managed security GPA 500 as well as GPXVPN 650 client systems. GPX 850 GPo 100

GPo 150

GPA 300

GPA 500

GPX 650

GPX 850

NEXT GENERATION UTM FIREWAL APPLIANCES interfaces interfaces NextPorts Generation utM GBE GBE Ports System Performance* System Performance* Firewall throughput (Mbps) Firewall throughput (Mbps) VPN IPSec throughput (Mbps) interfaces VPN IPSec throughput (Mbps) UTM throughput (Mbps) GBE Ports UTM throughput (Mbps) IDS/IPS throughput (Mbps) IDS/IPS throughput (Mbps) System Performance* dimensions Firewall throughput (Mbps) dimensions H x W x D (mms) VPN IPSec H x throughput W x D (mms)(Mbps) Gross Weights (kgs) UTM throughput (Mbps) Gross Weights (kgs) IDS/IPS Power throughput (Mbps) Power Input Voltage (V) Input Voltage (V) dimensions Consumption (W) - full load (W) - full load H x W xConsumption D (mms) Gross Weights (kgs) environmental environmental Operating Temperature (°C) Power Operating Temperature (°C) Storage Storage Temperature (°C) Input Voltage (V)Temperature (°C) RelativeRelative Humidity (Non condensing) Humidity (Non condensing) Consumption (W) - full load environmental *1 - to be later later *1 announced - to be announced Operating Temperature (°C)

from Q4/2013 from Q4/2013 GPo4 100 4

GPo4 150

4

GPA4 300

GPA6 500

4

6

GPX8 650

GPX8 850

8

8

*1 *1 *1 from Q4/2013 *1 4 -

1 700 1 700 200 200 100 4 100 250 250

1 900 1 900 250 250 180 4 180 300 300

2 100 2 100 320 320 300 6 300 400 400

6 000 6 000 700 700 450 8 450 1 200 1 200

7 500 7 500 1 500 1 500 1 000 81 000 1 500 1 500

*1 *1 *1 *1 -

1 700 42 x 210 x 210 200 42 x 210 x 210 2.9 100 2.9 250

1 900 44 x 426 x 238 250x 426 x 238 44 3 180 3 300

2 100 44 x 426 x 238 320 44 x 426 x 238 3 300 3 400

6 000 44 x 426 x 365 44700 x 426 x 365 6 450 6 1 200

7 500 44 x 426 x 365 1 x500 44 426 x 365 6 1 0006 1 500

AC 100-240 AC 100-240

AC 100-240 AC 100-240

AC 100-240 AC 100-240

AC 100-240 AC 100-240

AC AC 100-240 100-240

*1 *1

*1 *1 *1

*1 *1

35 35 42 x 210 x 210

41 41 44 x 426 x 238

41 44 x 426 x 41 238

66 44 x 426 x66 365

2.9

3

3

6

*1

66 44 x 426 66 x 365 6

*1

*1

0 ~ 400 ~ 40

0 ~ 40 0 ~ 40

0 ~ 40 0 ~ 40

0 ~ 040~ 40

0 ~040 ~ 40

*1 *1 *1 *1

*1

-10 ~ -10 70 ~ 70 AC 100-240 20 ~ 90% 3520 ~ 90%

-10 ~-10 70 ~ 70 AC 100-240 20 ~ 20 90% 41 ~ 90%

-10 ~-10 70~ 70 AC 100-240 20 ~20 90% 41 ~ 90%

-10 -10 ~ 70~ 70 AC 100-240 20 ~2090% 66 ~ 90%

-10-10 ~ 70 ~ 70 AC 100-240 20 20 ~ 90% 66 ~ 90%

*1

*1

0 ~ 40

0 ~ 40

0 ~ 40

0 ~ 40

0 ~ 40

Storage Temperature (°C)

*1

-10 ~ 70

-10 ~ 70

-10 ~ 70

-10 ~ 70

-10 ~ 70

Relative Humidity (Non condensing)

*1

20 ~ 90%

20 ~ 90%

20 ~ 90%

20 ~ 90%

20 ~ 90%

*1 - to be announced later

Next Generation Firewall Next Generation Firewall

GPz 1000 GPz 1000

2500 GPz GPz 2500

5000 GPzGPz 5000

Next Generation Firewall

GPz 1000

GPz 2500

GPz 5000

10

18 18 4/0 4/0

18 18 4/2 4/2

Yes Yes Yes Yes Yes Yes 18 Yes Yes

YesYes YesYes YesYes 18 Yes Yes

interfaces interfaces GBE Ports GBE Ports SFP (Mini / SFP+GBIC) (Mini Ports GBIC) Ports SFP / SFP+ Redundant - HDD (Raid) Redundant - HDD (Raid) Redundant Power supply Redundant - Power- supply VPN - acceleration Crypto acceleration interfaces VPN - Crypto GBE Ports IPMI - Remote management IPMI - Remote management

9

SFP / SFP+ (Mini GBIC) Ports System Performance* System Performance* Redundant - HDD (Raid) (Mbps) Firewall throughput Firewall throughput (Mbps) Redundant Powerthroughput supply VPN-IPSec (Mbps) VPN IPSec throughput (Mbps) VPN - Crypto acceleration UTM throughput (Mbps) UTM throughput (Mbps) IPMI - Remote IDS/IPS management throughput (Mbps) IDS/IPS throughput (Mbps) Concurrent sessions System Performance* Concurrent sessions New sessions(Mbps) pr. Second Firewall throughput New sessions pr. Second VPN IPSec throughput (Mbps) dimensions dimensions UTM throughput H x W x D(Mbps) (mms) H x W x D (mms) IDS/IPSGross throughput (Mbps) Weights (kgs) Gross Weights (kgs) Concurrent sessions Power New sessions pr. Second Power Input Voltage (V) Input Voltage (V) Consumption (W) - full load / rating dimensions Consumption (W) - full load / rating Heat Dissipation - full load / rating H x W xTotal D (mms) Total Heat Dissipation - full load / rating Redundant Gross Weights (kgs)Power Supply Redundant Power Supply Power environmental environmental Operating Input Voltage (V) Temperature (°C) Operating Temperature (°C) Storage Temperature Consumption (W) - full load /(°C) rating Storage Relative Temperature (°C)(Non condensing) Humidity Total Heat Dissipation - full load / rating Relative Humidity (Non condensing) Redundant Power Supply

10 4/0

4/0

Yes

Yes

Yes

Yes

Yes 10 Yes

Yes

Yes

4/0

4/0

4/2

Yes 7 500 7 500 Yes 2 000 2 000 Yes 1 000 1 000 Yes 1 500 1 500 2 000 000 2 000 000 25 000 7 500 25 000 2 000

Yes10 000 10 000 Yes2 500 2 500 Yes1 500 1 500 Yes2 500 2 500 2 500 000 2 500 000 30 000 10 000 000 30 2 500

Yes 20 000 20 000 Yes4 000 4 000 Yes2 500 2 500 Yes3 000 3 000 3 500 000 3 500 000 40 000 20 000 000 40 4 000

1 88 000 x 430 x 633 88 x 430 x 633 1 500 18 18 2 000 000

188500 x 430 x 633 88 x 430 x 633 2 500 18 18 2 500 000

2 500 88 x 430 x 633 88 x 430 x 633 3 00018 18 3 500 000

25 000 AC 100-240 AC 100-240

30 000 AC 100-240 AC 100-240

40 000 AC 100-240 AC 100-240

88 x 430 x 633 18 yes yes

88 x 430 x 633 18 yes yes

88 x 430 x 633 18 yes yes

10 ~ 40 AC 100-240 10 ~ 40 -40 ~ 65

10 ~ 40 AC 100-240 10 ~-40 40 ~ 65

10 ~ 40 AC 100-240 10 -40 ~ 40~ 65

-40 ~10 65~ 85% 10 ~ 85% yes

-40 ~ 1065 ~ 85% 10 ~ 85% yes

-4010 ~~ 6585% 10 ~ 85% yes

* System performance depends on activated proxies, IDS, application level and number of active VPN connections. We do not offer an express or implied warranty for the correctenvironmental /up-to-dateness of the information contained may be at of anyactive time).VPN Future products functions will be available at the appropriate time. *Operating Systemness performance depends on activated proxies, IDS, here application andchange number connections. We do not offer anmade express or implied warranty correctTemperature (°C) 10 (which ~ 40 level 10 ~ 40 or 10 ~ 40 for the ness /up-to-dateness time. Storage Temperature (°C)of the information contained here (which -40 ~may 65 be change at any time). Future products -40 ~or65functions will be made available at the appropriate -40 ~ 65 Š2013 gateprotect AG Germany. All rights reserved. Relative Humidity (Non condensing) 10 ~ 85% 10 ~ 85% 10 ~ 85%All rights reserved. Š2013 gateprotect AG Germany.

MANAGEMENT

- Role based Firewall Administration - SSH-CLI - Desktop configuration saved / restored separately from backup - Object oriented firewall configuration - Direct Client Update function Ergonomic Graphic User Interface - ISO 9241 compliant - Immediate visual feedback for each setting - Self-explanatory functions - Overview of all active services - Overview of the whole network - Layer and zoom function

USER AUTHENTICATION

- Active Directory / OpenLDAP support - Local User database - Web-interface authentication - Windows-client authentication - Single sign on with Kerberos - Single- and Multi login - Web Landing page

TRAFIC SHAPING / QOS

- Multiple Internet connections separately shapeable - All services separately shapeable - Maximum and guaranteed bandwidth adjustable - QoS with TOS-flags support - QoS inside VPN connection support

HIGH AVAILABILITY

- Active-passive HA - State synchronization - Single and Multiple dedicated links support - Stateful Failover

BACKUP & RECOVERY

- Small backup files - Remote backup & restore - Restore backup on installation - Automatic and time based backups - Automatic upload of backups on FTPor SCP-Server - USB Drive recovery option

LOGS, REPORTS, STATISTICS - Email Reporting - Logging to multiple syslog-servers - Logs in admin-client (with filter) - Export to CSV-files - IP and IP-group statistics - Separate services - Single user / groups - TOP-lists (Surfcontrol) - IDS- / Traffic-statistics - Application Control traffic statistics - Antivirus- / Antispam-statistics - Defence statistics

MONITORING*

- System Info (CPU, HDD, RAM) - Network (interfaces, routing, traffic, errors) - Processes - VPN - User Authentication SNMP - SNMPv2c - SNMP-traps - HA*

LAN / WAN-SUPPORT

- Ethernet 10/100 MBits/s - Gigabit and 10 Gigabit Ethernet*2 - SFP and SFP+ Fibre optics support*2 - MTU changeable (Ethernet/DSL) - PPP-PAP, PPP-CHAP authentication - Inactivity timeout / Forced disconnect time - xDSL - Multi WAN support - WAN failover - Loadbalancing - Time controlled internet connections - Manual and automatic DNS assignment - Multiple dynDNS support - Source based routing - Routing protocols RIP, OSPF - DHCP - DMZ VLAN - 4094 VLAN per interface - 802.1q ethernet header tagging - Combinable with bridging Bridge-mode - OSI-Layer 2 firewall function - Spanning tree (bride-ID, port-cost) - Unlimited interfaces per bridge - Combinable with VPN-SSL

COMMAND CENTER

- Monitor & Active Configuration of 500+ firewalls - Central Configuration and Monitoring of VPN Connections - Single and group backup - Plan automatic backup in groups - Single and group update & licensing - Create configuration templates and apply on multiple firewalls - Certificate Authority - Certificate based 4096 bit encrypted connections to the firewalls - Display settings of all firewalls - Role based User Management

VPN

- VPN wizard - Certificate wizard - Site-to-Site - Client-to-Site (Road Warrior) - PPTP - Export to One-Click-Connection X.509 certificates - CRL - OCSP - Multi CA support - Multi Host-cert support IPSec - Tunnel mode - IKEv1, IKEv2 - PSK / Certificates - DPD (Dead Peer Detection) - NAT-T - XAUTH, L2TP SSL - Routing mode VPN - Bridge mode VPN - TCP/UDP - Specify WINS- and DNS-Servers

UNIFIED THREAT MANAGEMENT* Web-filter

- URL-Filter with safe search enforcement - Content Filter - Block rules up to user-level - Black-/ White lists - Import / Export of URL lists - File Extension blocking - Category based website-blocking - Self definable categories - Scan technology with online-database - Intransparent HTTP-proxy support

Application Control - Layer 7 Packet filter (DPI) - Filter Applications instead of ports - Detection & Control of Skype, Bittorrent and others as well as Web 2.0 Applications like Facebook Antivirus - Kaspersky Anti-Virus Engine - Complete Protection from all malware - HTTP, HTTPS - FTP, POP3, SMTP - Exceptions definable - Manual and automatic updates Antispam - Scan-level adjustable - Real-time Spam Detection - GlobalView Cloud using Recurrent Pattern Detection (RPD) - Mail Filter - Black- / White lists - Automatically reject/delete emails - AD Email address import Intrusion Prevention - Individual custom rules - Security-level adjustable - Rule groups selectable - Exceptions definable - Scanning of all interfaces - DoS, portscan protection - Malicious network packet protection Proxies - HTTP (transparent or intransparent) - HTTPS - Support for Radius server, AD server, local user database - FTP, POP3, SMTP, SIP - Time-controlled

10


ComGuard

SafeNet is a leading global provider of data protection. For over 25 years, Fortune 500 global corporations and government agencies have turned to SafeNet to secure and protect their most valuable data assets and intellectual property. SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments. HSM Overview SafeNet Hardware Security Modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services. SafeNet HSMs are ranked #1 in the market worldwide. They provide the highest-performing, most secure, and easiest-to-integrate application and transaction security solution for enterprise and government organizations. With a broad range of HSM offerings and a full range of API support, SafeNet HSMs enable application developers to easily integrate security into custom applications. In partnership with leading application solution providers, SafeNet has produced HSMs that offer end-to-end protection for organizations, helping them achieve regulatory compliance, streamline business processes, reduce legal liabilities, and improve profitability . Today, organizations are asking: How can I ensure my keys are protected throughout the key life-cycle? Can hardware security modules help my company meet compliance mandates? Should I consider an HSM if I need to accelerate my cryptographic operations? How can HSMs help secure my assets in the cloud?

Data Encryption & Control SafeNet offers a broad range of Data Encryption and Control solutions that enable organizations to move past silo constrained encryption and to centrally, uniformly deploy encryption in a scalable manner that spans the enterprise, and effectively control their security policies. SafeNet solutions deliver unmatched coverage—securing databases, applications, personal identifiable information (PII), and storage in the physical and virtual datacenter and the cloud. Moreover, SafeNet also provides the critical key management needed to effectively and efficiently enable protection across the enterprise wherever data resides. With SafeNet, organizations can apply data protection where they need it, when they need it, and how they need it – consistently and effectively. Data Encryption & Control Products SafeNet Data Encryption and Control solutions enable you to protect and control sensitive data as it expands in volume, type and location, from the data center to virtual environments and the cloud while improving compliance and governance visibility and efficiencies through centralized management and policy enforcement.

Crypto Foundation Deliver root of trust services for services for enterprisewide data protection

Hardware Security Module (HSMs) SafeNet Hardware Security Modules (HSMs) provide reliable protection for applications, transactions and information assets by securing cryptographic keys. SafeNet HSMs are the fastest, most secure, and easiest to integrate application security solution for enterprise and government organizations to achieve regulatory compliance, reduce the risk of legal liability, and improve profitability.

Structured Data Protection Protect regulated data in databases and applications

KeySecure DataSecure KeySecure Interoperability

Unstructured Data Protection Protect regulated Data in files and storage

Tokenization Manager ProtectDB ProtectApp

StorageSecure ProtectFile SafeMonk

Cloud Security Assure ownership, isolation and compliance of virtualized data ProtectV

Multi factor Authentication

General Purpose HSMs Crypto Hypervisor Luna SA Luna PCI-E Luna G5 Luna CA4 Luna SP ProtectServer ProtectServer External

Payment HSMs Luna EFT View PIN

Product Certifications FIPS 140-2 Common Criteria PIC Compliance IdenTrust Compliance

Enterprise Key Management With SafeNet, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key managementlifecycle and throughout the enterprise. SafeNet solutions can manage keys across heterogeneous encryption platforms, offering support for the KMIP standard as well as proprietary interfaces. Now, security teams can uniformly view, control, and administer cryptographic policies and keys for all their sensitive data—whether it resides in the cloud, in storage, in databases, or virtually anywhere else.

11

Multi-factor authentication serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Yet the recent surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control - like SaaS applications and mobile device management - represents a shift in how trust and control is established and maintained. New threats, risks, and vulnerabilities as well as evolving business requirements underscore to the need for a strong authentication approach based on control, choice, and future-forward scalability. Network Encryption Products Proven reliability, highest throughput, and lowest latency make SafeNet’s network security devices the ideal solution for protecting data in motion, including time-sensitive voice and video streams. SafeNet’s network security devices provide the fastest and easiest way to integrate robust, FIPS-certified network security to protect data for enterprise and government organizations.

Ethernet Encryption SafeNet offers Ethernet Encryptors that deliver instant protection across the network at Layer2, adding far less latency to missioncritical applications than traditional Layer 3 solutions like IPsec VPNs. 1G & 10G Ethernet 10MB & 100MB Ethernet Branch

Fibre Channel Encryption SafeNet Fibre Channel Encryptors are a high performance, purpose-built integrated security solution providing point to point encryption for 1,2 and 4 Gbps Fibre Channel networks

12


ComGuard

Tripwire delivers the industry’s best portfolio of solutions for critical security controls including; security configuration management, vulnerability management, file integrity monitoring, and log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Provide continuous, flexible monitoring of the entire IT infrastructure to immediately determine when changes adversely affect your security and compliance Automate and assure regulatory and policy compliance Deliver actionable, risk-based insight and analytics aligned with business initiatives Measure security performance against internal goals Offer flexible deployment options including on premise, cloud-based or hybrid

Vulnerability Management Enterprise Vulnerability Management: Tripwire IP360 Why is the solution relevant and important to an enterprise Understanding security risk on a global enterprise network is essential to comprehensive IT risk management and creating confidence in your security program. However, the high rate of change on enterprise networks, the constantly changing threat environment, and increased focus on internal and regulatory compliance have made this task increasingly difficult. Accurate identification of vulnerabilities and effective prioritization is the only answer to effectively dealing with this challenge. Integrated web application scanning. Today’s threat environment is unimaginably dynamic —with thousands of new vulnerabilities reported annually—the sheer volume of launched attacks demands best-in-class enterprise vulnerability management solutions to provide comprehensive discovery and management of critical vulnerabilities in support of the IT security lifecycle. Up-to-date vulnerability management is critical, especially as the time between vulnerability discovery and the release of an exploit is, in some cases, narrowing to zero. Furthermore, evolving technology constantly increases attack vectors into the enterprise, increasing the number of vulnerabilities and required patches across the entire network. What benefits will the enterprise derive by implementing the solution Tripwire’s enterprise vulnerability management solutions intelligently discover all endpoints and networked assets, and apply advanced analytics to prioritize vulnerabilities in a meaningful framework - flagging the greatest risks so security teams can make quick, quality decisions within a rapidly changing threat landscape. Tripwire IP360 discovers a wealth of data about the critical systems that reside on your network, but rather than provide that data in an endless list like traditional solutions, Tripwire IP360 prioritizes remediation tasks, enabling users to focus on the items that will most effectively reduce risk on critical systems. This profiling and prioritization enables security teams to best use their valuable resources to reduce their highest vulnerability risk. Reports are available for all audiences, from technically-focused users to executives, providing a customized view into the state of the network. The actual product and insight into the product from the solution perspective Tripwire offers Enterprise Vulnerability Management Solutions that includes best of breed appliance-based vulnerability assessment and innovative cloud based scanning for the extended enterprise. Tripwire IP360, a leading enterprise vulnerability management solution, enables enterprises and government agencies to cost-effectively measure and manage their security risk. Using agentless technology, Tripwire IP360 has set the industry standard for depth and breadth of vulnerability discovery and coverage. It comprehensively profiles all networked devices and includes up-to-date coverage of the latest operating systems, applications, and vulnerabilities, providing the ideal foundation for assessing every system on the network. Tripwire IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally-distributed networks. WebApp360, the web application scanner included with Tripwire IP360, extends Tripwire’s market-leading vulnerability management suite to include assessment of enterprise web applications, offering the industry’s most comprehensive view of application security risks. WebApp360 enables enterprises to automatically and continuously detect critical web application vulnerabilities within the context of overall IT risk, enabling security teams to focus resources on the most important risks. Together, Tripwire IP360 and Tripwire WebApp360 offer customers an unprecedented, prioritized assessment of IT security risk, from web applications to the underlying IT infrastructure supporting them.

13

Security Configuration Management Security Configuration Management: Tripwire Enterprise Why is the solution relevant and important to an enterprise Data breaches continue to rank as a top threat to corporate environments, as more and more attackers successfully find their way into networks. While there’s no such thing as a 100 percent secure IT environment, taking the fundamental steps to assess and harden IT systems is basic “blocking and tackling” that eliminates the root cause of the vast majority of breaches. These steps include (1) Assess and inventory configurations on all servers and devices, and com¬pare the results to some understood, recognized security standard (like CIS, NIST, or ISO 27001) and (2) Gain immediate, real-time insight into any changes to the files, configura¬tions items and states that define this security standard. By eliminating the “easy ins” (like open ports and unused services, the use of default or easily guessed administrator passwords, or improperly configured firewalls), and keeping continuous watch on these systems, it enables the enterprise to reduce the attack surface while detecting the events and changes that indicate attacks in progress—like secu¬rity controls disabled by anti-forensic activities, oddly elevated permissions, or unexpected changes to critical files. What benefits will the enterprise derive by implementing the solution Enterprises significantly reduce the attack surface with an end-to-end, continuous SCM solution for policy management, integrity monitoring and change auditing. Tripwire’s award-winning SCM solution delivers a scalable, automated way to ensure system integrity and continual system hardening of enterprise systems. By continuously monitoring all configurations and changes across the enterprise, organizations achieve and maintain a known, trusted state to reduce risk, prevent audit failures by complying with standards, and assure high availability across the extended enterprise. The actual product and insight into the product from the solution perspective Tripwire’s Continuous Security Configuration Management (SCM) solutions help organizations of all shapes and sizes successfully automate the hardening of their IT infrastructure and continuously monitor the integrity of those systems. Security Configuration Management is one of the most effective and cost-effective security controls you can implement, and it’s foundational to many regulatory standards and security frameworks. Tripwire Enterprise and Tripwire CCM provide best-in-class SCM so you can measurably reduce your infrastructure’s attack surface while improving your security posture. Tripwire offers agent and agentless, best of breed Policy Management, File Integrity Monitoring, Configuration Management and Discovery solutions so you can effectively automate the configuration management of every device on your network. Tripwire’s next-generation approach delivers it continuously at the speed of change and in context of your business for total visibility of your risk. SIEM – Security Incident & Event Management / Log Intelligence Enterprise Log Intelligence: Tripwire Log Center Why is the solution relevant and important to an enterprise The explosive increase in the volume of data and the number of targeted attacks along with their level of sophistication requires a proactive response by enterprises across the world. The greatest area of unmet need is effective targeted attack and breach detection. Today it takes weeks or months on average to detect a breach by even the most sophisticated and well prepared organization. Furthermore, the technology used to collect log data from across the network is unreliable and not secure. The need for a log intelligence layer has emerged to provide reliable & secure high-speed analysis and filtering of log and event data for faster detection of incidents. What benefits will the enterprise derive by implementing the solution Enterprises have confidence that they are securely & reliably collecting all logs to assure they have them for regulatory compliance and forensics efforts. By leveraging Tripwire Log Center, organizations can integrate their foundational security controls, intelligently analyze and filter all events, and reduce the volume of non-critical events and false positives. Tripwire Log Center prioritizes threats and security incidents based on the vulnerabilities, misconfigurations, unauthorized changes and value of the targeted assets. And Tripwire Log Center seamlessly integrates with the incident response processes, the Security Operations Center and the SIEM platform of choice to quickly alert and focus on the threats that pose the most serious risk to the business. The actual product and insight into the product from the solution perspective Tripwire’s Log Intelligence solution, Tripwire Log Center, collects, analyzes and correlates data to improve security and simplify compliance. Tripwire offers an innovative Log Intelligence solution that to provide secure and high speed log collection, analysis and filtering of log and event data, resulting in only actionable and relevant events being sent to IT security teams. The Tripwire solution offers SIEM capability or can support other SIEMS with secure and reliable agent-based log collection. Tripwire Log Center intelligently classifies and prioritizes events based on correlation of your foundational security controls: logs, configurations, vulnerabilities, and changes. Tripwire Log Center improves incident and breach detection by ensuring that all log data is analyzed and intelligently correlated with the business value of an asset, the detection of a potential threat and the understanding of the vulnerability state in one Log Intelligence solution.

14


ComGuard

Netsweeper Solutions for Enterprise Web Filtering & Security As a software solution that installs on commodity-grade hardware, Netsweeper specializes in web filtering. You get the protection you need, quickly, easily and at a manageable total cost of ownership. Our flexible licensing models also mean you have room to grow with us without fear of outages. Increase productivity develop and maintain Safe employee browsing Solidify network security, block compromised sites and scan downloads for malware crushing infections Boost bandwidth with Web 2.0 by blocking inappropriate downloads such as games and video streaming Scan HTTPS-encrypted traffic giving extra security and infection control Reporting snapshots access to granular reporting visualize your organizational browsing behavior in line with audit standards Multiple deployment modes Active directory integration, Proxy deployment and further enterprise custom requirements Local support guaranteed with a trained channel and reseller network complimented with a certified engineering team

Industry leading web filter Comprehensive web security Competitive low cost of ownership Hardware Free no large appliances 400 Million users across the globe Global references in Key Accounts

Netsweeper features,capabilities and specifications CATEGORIZATION / FILTERING No latency for approved traffic Over 50 predefined categories Custom category support Granular, URI-based filtering Configurable custom categories Dynamic categorization of new URIs A ‘learning’ local cache Filtering for HTTP and HTTPS/SSL Detect & block anonymous proxies IM & P2P blocking Malware, phishing & virus blocking Local allow/deny lists Web 2.0 Categorisation Application/protocol blocking AUTHENTICATION Integration to LDAP, Radius, and AD Transparent authentication options Captive portal login support Browser based authentication

POLICY MANGEMENT Granular policies by user, group, site, etc Time of day policies ‘Safe Search’ enforcement Keyword enforcement Default & guest filtering policies Minimum filtering policy options Bypass/override options (w. tracking) Standard and custom block pages Thresholds & “ban/lock out” options eSafety “warning messages” YouTube for Schools support DEPLOYMENT OPTIONS Clustering and multi tenant support DPI integration Network TAP/Bridge Port mirroring Squid proxy Cisco/Sandvine/Procera integration Client filter (windows/Mac) Web API available for integrations

ADMINISTRATION / REPORTING Comprehensive Web Admin Secure Remote Administration Delegated Administration Detailed usage & traffic logging Standard and custom reports Exportable/integrated reports Real time and historical reports SNMP support URL Alerts (submit for human review) Reports by category/user/group/time SYSTEM REQUIREMENTS Minimum recommended: 2GHz processor, 4GB RAM, 250GB HD 1 or more Network Interfaces, Netsweeper varies depending on traffic volume and deployment model. Multiple server deployment is also supported Virtualized deployment options

Netsweeper helps businesses to improve productivity, mitigate liability, and reduce the impact of web threats. We ensure you can reap the benefits of the web while avoiding the risks to your systems and your business. Best of all, we make it easy to achieve, and we help you control your total cost of ownership.” Andrew Graydon,COO.

15

Web Filtering for Enterprise Leveraging the power of the web can be a challenge for the small business (and the not-so-small business). Web threats, malware and phishing can all put business information at risk, and of course productivity can be a challenge in the face of online video, social media, online games and other distractions. Today’s companies often don’t have the IT resources to buy and maintain filtering appliances or install client software across all computers in the business. The Cost of Lost Productivity A 2012 salary.com survey reports that 64% of employees spend time surfing the Internet on websites unrelated to work. 39% of responders claimed to spend less than an hour a week, but 61% of those spent 2 or more hours a week on unproductive surfing. For a 10-person SMB with staff earning $20/hour, averaging 30 minutes of daily time wasted, this translates into a $2100/month productivity problem.

Netsweeper Solution Advantages No software needed on site. Deployments are simple and easy. Hosted options available for SME/SMB. Device ‘agnostic’. Network-based filtering applies across any and all connected devices.

Excellent Zero Hour Protection Today, dynamic, federated content and content is generated through feeds, mashups and browsers that run AJAX scripts. Multiple injection points means dozens of URIs in a single page. Translation: Web Threats are a bigger issue today than they have ever been!

Excellent zero hour protection. We categorize new web threats within seconds of a user finding them.

Any time a new URI is encountered by one of our 400 million-plus users, it is referred to our cloud-hosted categorization engines, where heuristic analysis of all content is performed to categorize the page/ information

Zero latency. No latency is introduced to permitted web traffic. Asymmetric Support. Just show us the outbound web requests and we’ll do the rest.

Visual analytics of browsing

Minimal Capital Costs Get the solution deployed with a minimum of upfront investment/risk.

About Netsweeper Netsweeper Inc. provides carrier-grade web content filtering and web threat management that protects more than 400 million users worldwide. With more than a decade of experience in the filtering market, Netsweeper solutions ensure compliance with regulations, defend against web-based threats and help deliver a positive, productive and safe Internet experience. Netsweeper web filtering is hardware-agnostic, AIbased, and its ‘in-the-cloud’ CNS (category name servers) are continuously updated by the web use of millions of users worldwide. We deliver better protection at a lower total cost of ownership. Netsweeper supports customers worldwide with offices in North America, Europe, Asia and the Middle East as well as a network of partners and distributors.

16


ComGuard clavister

WolfSeries

The fiber-centric approach of the Clavister W8 makes it a premium choice as the key firewall in a future-proofed installation and the perfect solution where premium security and speed is required.

Dedicated management and HA ports Clavister W3

clavister

WolfSeries

Clavister Key W3 Benefits Specifications

Clavister W3 Specifications

W3

Firewall Performance (Gbps) VPN Performance (Mbps) Concurrent Connections

Concurrent VPN Tunnels (SSL/IPsec)

W3 Pro

3

6

200

400

500 000

1 000 000

500/500

1 000/1 000

Excellent value for money

W3

Clavister W7

Ethernet Interfaces

6 x 1GbE (RJ45)

Key Features Comprehensive connectivity Dedicated management and HA ports

Key Benefits

robust

256

512

10

25

Clavister OS

Clavister cOS Core

Form Factor

19” Rack Mountable (1U)

W3 Pro

200

Ethernet Interfaces

6 x 1GbE (RJ45)

CID: w8 (2012/06)

Clavister cOS Core

For organizations with large investments in copper-based network infrastructure, the clavister 19”W7 Rack Mountable (1U) copper-centric approach of the Clavister enables them toWolfSeries continue to utilize their investClavisterseamlessly. W7 ment, and start to adopt newer fiber-based network components This makes Clavister Wolf Series – high performance, excellent scalability and robust the Clavister W7 the perfect solution bridging existing network solutions with newer fiber functionality WolfSeries investments.

Form Factor

ations that need premium network

Key Features

Clavister W8.............................................................................................................. 17

Clavister X8 ............................................................................................................... 18

tions.

We’re pleased to welcome you to the latest edition of Clavister Products and Solutions. Clavister E7 ............................................................................................................... 19 Here you will find information about us, our solutions and our current product range. We Clavister V3, V5, V7, V9 .............................................................................................. 20 hope this will be an inspiration for you and help you to choose the Clavister solutions that Clavister V3, V5,Clavister V7, V9 P8 ............................................................................................................... 21 best match your needs.

VirtualSeries

20

10 000 000

5 000

10 000

8 x 10GbE (SFP+), 4 x 1GbE (SFP)

2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

1 024 250

2 048 500

VPN Performance (Gbps)

Clavister OS

Clavister cOS Stream

Form Factor

19” Rack Mountable (1U)

Concurrent Connections

Concurrent VPN Tunnels (IPsec)

Clavister Virtual Series – excellent performance, feature-rich and efficient

For a faster, simpler and more secure world,

Low resource requirements

Peter Johansson, President and CEO Clavister AB

Support for Clavister Application Control Powerful firewall Support for Clavister Security Subscription

W8 PolarBearSeries

W8 Pro

Easy to use, deploy and manage 20

Support for Clavister Application Control

Support for Clavister Security Subscription

Easy to use, deploy and manage

Firewall Performance (Gbps)

Unified Centralized Management

The Clavister W7 is targeted towards large data centers, service providers and high-end enterprise backbone security solutions. Clavister W7 delivers incredible performance, up to 20 Gbps in a single 1U 19” rack mount and is perfect for situations where security is first priority and speed is key to getting the job done.

Virtual Routers Clavister OS Form Factor

WolfSeries

For organizations with large investments in copper-based network infrastructure, the

copper-centric approach of the Clavister W7 enables them to continue to utilize their investClavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden ment, and start to adopt newer fiber-based network components seamlessly. This makes the Clavister W7 the perfect solution bridging existing network solutions with newer fiber Phone: +46 (0)660 29 92 00 | www.clavister.com investments.

Clavister W5 Specifications

W5 Specifications W5 Pro vister Eagle Series is a set ofW5 network security products designed for remote Clavister Dedicated management and HA ports and branch office applications, which requires excellent performance, world-class W5 and innovative functionality. Firewall Performance (Gbps)

8

16

VPN Performance (Gbps)

1

2,5

Concurrent Connections

2 500 000

5 000 000

2 500/2 500

5 000/5 000

Concurrent VPN Tunnels (SSL/IPsec) Ethernet Interfaces

2 x 10GbE (SFP+), 4 x 1GbE (SFP), 4 x 1GbE (RJ45)

Key(Gbps) Benefits Firewall Performance

Management/High Availability Ports

512

1 024

Form Factor

100

Support for Clavister Security Subscription

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

1 024

Virtual Routers

100

250

W7 Pro 20 10

10 000 000 10 000

Key BenefitsW7

2 x 10GbE (SFP+), 4 x 1GbE (SFP), 16 x 1GbE (RJ45) 2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN)

512

Virtual Routers

250

1 024 500

Clavister OS

Clavister cOS Stream

Form Factor

19” Rack Mountable (1U)

Ethernet Interfaces

W7 Pro

10

20

5

10

Modular, extensible and powerful Reliable, world-class 5 000 000 design

Management/High Availability Ports Virtual Interfaces (VLAN) Virtual Routers

d Centralized Management Key Features

Support for Clavister Security Subscription

Key Benefits

V7

V9

1

3

5

10

Perfect for demanding applications

100,000

250,000

Fast, powerful firewall

Support for Clavister Security Subscription Industry standards

Concurrent VPN Tunnels (SSL/IPsec)

Clavister E7 Specifications Firewall Performance (Mbps)

E7 Remote

E7

E7 Pro

200

250

400

VPN Performance (Mbps)

20

Concurrent Connections

10 000

20 000

50 000

2/2

100/100

50

250/250

80

Ethernet Interfaces

8 x 1GbE (RJ45) switchblock + 3 1GbE (RJ45)

5 000

Virtual Interfaces (VLAN)

2

Virtual Routers

0

32

128

5

10

Clavister OS

Clavister cOS Core

Form Factor

Desktop

512

1 024

250

500 Clavister cOS Stream

Clavister OS Form Factor

128

Clavister P8 Clavister P8 Specifications

20 000

50 000

2/2

100/100

250/250

8 x 1GbE (RJ45) switchblock + 3 1GbE (RJ45)

Virtual Interfaces (VLAN)

2

5 Clavister cOS Core

Form Factor

Desktop

128

X8

X8 Pro

500

1 000

256 10

Industrial DIN-mount

VPN Performance (Mbps)

100

200

Concurrent Connections

100 000

200 000

AB, Sjögatan(SSL/IPsec) 6 J, SE-891 60 Örnsköldsvik, Sweden Concurrent VPNClavister Tunnels Phone: +46 (0)660 29 92 00 | www.clavister.com

100/100

Ethernet Interfaces

Virtual Interfaces (VLAN)

128

Virtual Routers

256

5

10

Clavister OS

Clavister cOS Core

Form Factor

Industrial DIN-mount

PolarBearSeries

The Clavister P9 Blades together with the Clavister P9 Chassis offers the highest level of redundancy, scalability and performance possible. With capacity up to 560 Gbps, the AdvancedTCA-based chassis is capable of delivering the required processing power that telecoms operators and large-scale data centers require.

250/250 4 x 1GbE (RJ45)

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

Massive firewall performance

Clavister P9 Chassis Comprehensive connectivity

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

performance possible.

128 10

Clavister P9 Blade

Key Features Massive firewall performance Comprehensive connectivity Flexible configurations

Clavister P9 Blade Specifications

FlexibleClavister configurations PolarBear Series – robust ATCA design, uncompromising perClavister P8 Specifications formance P8 P8 AMC Module Key Benefits P8

Modular, extensible and powerful

Firewall Performance (Gbps)

Reliable, world-class design

P8 AMC Module

80

40

VPN Performance (Mbps)

40

10

Concurrent Connections

20 000 000

10 000 000

200 000

50 000

Ethernet Interfaces

Concurrent VPN Tunnels (IPsec)

8 x 10GbE (SFP+)

4 x 10GbE (SFP+)

Management/High Availability Ports

2 x 10GbE (SFP+) 2 x 1GbE (RJ45)

n/a

2 048

1 024

500

250

Firewall Performance (Gbps) VPN Performance (Mbps)

80

40

Clavister P9 Blade Specifications P9 Blade

Key Benefits

Firewall Performance (Gbps)

Powerful processing blades

Clavister cOS Stream

Form Factor

19” Rack Mountable (1U)

Management/High Availability Ports Virtual Interfaces (VLAN) Virtual Routers Clavister OS

PolarBear Series

8 x 10GbE (SFP+)

Key Features 2 x 10GbE (SFP+)

4 x 10GbE (SFP+)

CID: p9-blade (2012/06)

Firewall Performance (Gbps)

Extensible and powerful

Extensible and powerful

Clavister P9 Chassis

Clavister P9 Chassis Specifications P9 6002

P9 6006

P9 6014

P9 6016

Firewall Performance (Gbps)*

80

160

480

560

VPN Performance (Gbps)*

40

80

240

280

Compliance ATCA Blade Slots Switch Blade Slots Cooling Fans

PICMG 3.0, Rev. 2.0 ATCA Base Specification 2 n/a 2

4

PICMG 3.0/3.1, Rev. 2.0 ATCA Base Specification 12

14

2

2

2

2 (removable)

2 front (removable), 2 back (removable)

2 front (removable), 2 back (removable)

Clavister OS

Clavister cOS Stream

Clavister cOS Stream

Clavister cOS Stream

Clavister cOS Stream

Form Factor

2U 19” ATCA rack-mount

6U 19” ATCA rack-mount

13U 19” ATCA rack-mount

13U 23” ATCA rack-mount 13U ETSI 515 rack mount (optional)

* Performance reflect fully populated chassis.

CID: p9-chassis (2012/06)

AdvancedTCA Blade

VPN Performance (Mbps)

20

Concurrent Connections

20 000 000

Concurrent VPN Tunnels (IPsec)

200 000

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

4 x 10GbE (SFP+), 6 x 1GbE (SFP) 1 024

Virtual Routers

250

Clavister OS

Clavister cOS Stream

Form Factor

AdvancedTCA Blade

AMC Module

Clavister P9 Chassis Specifications

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden

P9 6002

Compliance

P9 6006 160

60 Örnsköldsvik, Sweden P9 6014Clavister AB, Sjögatan 6 J, SE-891 P9 6016 Phone: +46 (0)660 29 92 00 | www.clavister.com

480

560

Copyright Š 2012 Clavister AB. 80All rights reserved. The Clavister logo and all Clavister 240product names and slogans are trademarks or registered 280 trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

PICMG 3.0, Rev. 2.0 ATCA Base Specification

PICMG 3.0/3.1, Rev. 2.0 ATCA Base Specification

ATCA Blade Slots

2

4

12

Switch Blade Slots

n/a

2

2

2

2

2 (removable)

2 front (removable), 2 back (removable)

2 front (removable), 2 back (removable)

Cooling Fans

14

Clavister OS

Clavister cOS Stream

Clavister cOS Stream

Clavister cOS Stream

Clavister cOS Stream

Form Factor

2U 19” ATCA rack-mount

6U 19” ATCA rack-mount

13U 19” ATCA rack-mount

13U 23” ATCA rack-mount 13U ETSI 515 rack mount (optional)

* Performance reflect fully populated chassis. Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

Form Factor

Virtual Interfaces (VLAN)

250

CID: p9-blade (2012/06)

Robust and reliable

Clavister cOS Stream

Ethernet Interfaces

Robust andClavister reliable cOS Stream 19” Rack Mountable (1U)

40

250

Clavister OS

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

1 024

Comprehensive connectivity 500

1 024

Virtual Routers

2 x 1GbE (RJ45) 2 048

4 x 10GbE (SFP+), 6 x 1GbE (SFP)

Virtual Interfaces (VLAN)

n/a

Massive firewall performance

P9 Blade

200 000

Ethernet Interfaces

AMC Module

Extensible and powerful

20 000 000

Concurrent VPN Tunnels (IPsec)

Extensible and powerful

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

Ethernet Interfaces

20

Concurrent Connections

The Clavister P9blades Chassis offers the highest level of redundancy, scalability and perfor Powerful processing

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

CID: p8 (2012/06)

40

VPN Performance (Mbps)

Robust and reliable

10 Gbps, the AdvancedTCA-based chassis is mance 40 possible. With capacity up to 560 Concurrent Connections 20 reliable 000of000 000 000 power that telecom operators and large-scale Robustcapable and delivering the required 10 processing Concurrent VPN Tunnels (IPsec) 000 require. 50 000 data 200 centers

Clavister OS

The Clavister P9 Chassis offers the highest level of redundancy, scalability and perforClavister Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden mance possible. With capacity up to 560 Gbps, the AdvancedTCA-based chassis is E7AB,Pro capable of delivering the required processing power that telecom operators and large-scale Phone: +46 (0)660 29 92 00 | www.clavister.com data centers require. 400 Key Features

10 000

0

200

250/250

Firewall Performance5 (Mbps) Clavister cOS Core

Phone: +46 (0)660 29 92 00 | www.clavister.com clavister

PolarBearSeries

1 000

200 000 4 x 1GbE (RJ45)

Clavister OS

1,024

Key Features

100/100

Form Factor

clavister The Clavister P9 Blades offers uncompromising power and performance. Organizations are able to keep adding as many Clavister P9 Blades as theyPolarBearSeries can fit in a single Clavister P9 Clavister P9 Blade Chassis. The Clavister P9 Chassis offers the highest level of Clavister redundancy, scalability and PolarBear Series – robust ATCA design, uncompromising performance performance Clavister possible. AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden

PolarBearSeries

100 000

Virtual Routers

1,000,000

512

100

Concurrent Connections Concurrent VPN Tunnels (SSL/IPsec) Virtual Interfaces (VLAN)

5

500,000

X8 Pro

500

VPN Performance (Mbps)

Ethernet Interfaces

CID: x8 (2012/06)

32

Support Virtual Platform

Clavister PolarBear Series – robust ATCA design, uncompromising performance

Clavister OS

Firewall Performance (Mbps)

Unified Security Management

10 15 together with 25 the Clavister 50 P9 Chassis offers the highest level of The Clavister P9 Blades VMware ESXi redundancy, scalability and performance possible. With capacity up to 560 Gbps, the Core AdvancedTCA-based Clavister chassiscOS is capable of delivering the required processing power that Software telecoms operators and large-scale data centers require.

Virtual Routers

2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Ethernet Interfaces Virtual Routers

X8

Clavister X8 Specifications

Perfect for demanding applications

Clavister PolarBear Series1,500/1,500 – robust ATCA design, uncompromising per500/500 1,000/1,000 2,000/2,000 Up to 3 Up to 5 Up to 7 Up to 10 formance

Virtual Interfaces (VLAN)

10 000

19” Rack Mountable (1U)

32

Clavister X8 Specifications

Key Benefits

Phone: +46 (0)660 29 92 00 | www.clavister.com Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Performance (Mbps) 200 250 Firewall Performance (Gbps)* 80 Phone: +46 (0)660 29 92 00 |Firewall www.clavister.com Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister Massive AB. firewall performance CID: p8 (2012/06) Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document VPN Performance (Gbps)*is subject to change without prior notification. 40 VPNand/or Performance (Mbps)herein may be trademarks or registered 20 50 80 in this document is subject to change without prior notification. Other product names slogans mentioned trademarks of their respective companies. Information Comprehensive connectivity

Clavister E7

Clavister X8

Support for Clavister Application Control

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

Key Benefits

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

17

V5

Clavister 1 UnifiedP9 Security Management 2Blade 3

Ethernet Interfaces

Virtual Interfaces (VLAN)

2 x 10GbE (SFP+), 4 x 1GbE (SFP), 16 x 1GbE (RJ45)

Form Factor

E7

V3

Key Features

Concurrent VPN Tunnels (SSL/IPsec)

10 000 000

Clavister OS

E7 Remote

Key Benefits

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

Virtual Routers

Clavister E7 Specifications

EagleSeries

Concurrent VPN Tunnels (SSL/IPsec)

CID: e7 (2012/06)

50

PolarBearSeries

Easy to use, deploy and manage Unified Centralized Management

Software

Up to 10 1,024

Form Factor

CID: w7 (2012/06) 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Support for Clavister Application Control herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to changeConcurrent without prior notification. Connections Powerful firewall

25

VMware ESXi

Form Factor

Key Features

Clavister P9 Chassis

The Clavister E7 is perfectly suited as a remote access firewall or as a branch office firewall, offering great performance and connectivity. The Clavister E7 offers great connectivity in a small, beautifully designed enclosure. It is full of capabilities, yet small enough to keep on the desktop. Its design is so stunning, you want to share it with others.

15

PolarBearSeries 1,000,000

2,000/2,000

LynxSeries

The Clavister X8 is targeted at those installations where standard security products are unable to function reliably. With its industrial, rugged design, the durable Clavister X8 can withstand harsh, industrial environments and deliver outstanding solid performance. It also offers unified security management between office and industry environments. The Clavister X8 is perfect for tough environments, such as remote industrial locations, offshore installations and other demanding environments where high-end security is required.

Copyright 2012 Clavister The Clavister P9 Blades offers uncompromising power andŠ performance. OrganizationsAB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. are able to keep adding as many Clavister P9mentioned Blades as they can fit in a single Clavister CID:Information x8 (2012/06) Other product names and/or slogans herein may be P9 trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. in this document is subject to change without prior notification. Chassis. The Clavister P9 Chassis offers the highest level of redundancy, scalability and

clavister

The Clavister Eagle Series is a set of network security products designed for remote access and branch office applications, which requires excellent performance, world-class design and innovative functionality.

CLAVISTER EAGLE SERIES

5 000

10

Clavister cOS Core

The Clavister PolarBear Series is a set of network security products designed for telecom operators and large-scale data centers requiring high performance, excellent scalability and robust functionality. The Clavister P8 is an extreme powerful firewall solution with a wide range of options to meet the toughest performance targets for telecoms operators and large-scale data centers. Based on µTCA (MicroTCA) platform, it delivers up to 80 Gbps in its base configuration, with capacity up to 240 Gbps in a single 1U 19” rack mount. This makes the Clavister P8 the perfect solution for telecoms operations and large-scale data centers where performance demands are ever increasing.

EagleSeries

Clavister Eagle Series – feature-rich, entry-level firewall, robust functionality

512

Concurrent Connections

Clavister E7

to use, deploy and manage

128

VPN Performance (Gbps)

CLAVISTER POLARBEAR SERIES

enefits

32

2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

19” Rack Mountable (1U)

ort for Clavister Security Subscription clavister

Up to 7

Firewall Performance (Gbps)

CID: v (2012/06)

Concurrent VPN Tunnels (IPsec)

Clavister cOS Core

Form Factor

Up to 5

Clavister PolarBear and scalability, smallest 5 000 Series – highest performance 10 000 footprint 8 x 10GbE (SFP+), 4 x 1GbE (SFP)

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

2 x 1GbE (RJ45) 512

Up to 3

10 000 000

CID: v (2012/06)

Concurrent Connections

5 000/5 000 CID: w7 (2012/06)

Ethernet Interfaces

Clavister OS

V9 5

500,000

1,500/1,500

Phone: +46 (0)660 29 92 00 | www.clavister.com Massive firewall performance

VPN Performance (Gbps)

5 000 000

Virtual Interfaces (VLAN)

Clavister OS Control ort for Clavister Application

5 000 000

Management/High Availability Ports

2,5

2 x 10GbE (SFP+), 4 x 1GbE (SFP), 4 x 1GbE (RJ45)

Management/High Availability Ports

5

Concurrent Connections

Support for Clavister Security Subscription Industry standards

10

3

250,000 1,000/1,000

Key Features Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden

Firewall Performance (Gbps)

16

19” Rack Mountable (1U)

10

VPN Performance (Gbps) Concurrent VPN Tunnels (IPsec)

250

Ethernet Interfaces

rful firewall

W5 Pro

Clavister cOS Core

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. uct names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

eatures

Firewall Performance (Gbps)

Excellent value for money

Ethernet Interfaces

vister E7 is perfectly as a remote access firewall or as a branch office firewall, VPN suited Performance 1 (Gbps) Excellent value for money great performance and connectivity. connectivity in a Concurrent ConnectionsThe Clavister E7 offers2 great 500 000 for Clavister Subscription eautifully designed enclosure. It is Support full of capabilities, yetSecurity small enough to keep on Concurrent VPN Tunnels (SSL/IPsec) 2 500/2 500 ktop. Its design is so stunning, you want to share it with others. Virtual Routers Clavister OS

W7

Key Benefits

8

2 x 1GbE (RJ45)

Virtual Interfaces (VLAN)

Dedicated management and HA ports

5

2

100,000 500/500

Support Virtual Platform

Powerful and modular Clavister W7 Specifications

Clavister W7 Specifications

3

1

Concurrent Connections Concurrent VPN Tunnels (SSL/IPsec)

Virtual Routers

Copyright Š 2012 Clavister AB. All rights reserved. TheW7 Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Clavister W5 Massive firewall performance Clavister Key Features Massive firewall performance Comprehensive connectivity 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks registered trademarks of Clavister AB. herein may be trademarks or registered trademarks of their respective CID: w8 (2012/06) Otheror product names and/or slogans mentioned companies. Information in this document is subject to change without prior notification. Massive firewall performance Comprehensive connectivity herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change withoutconnectivity prior notification. Comprehensive Powerful and modular Comprehensive connectivity

er Eagle Series – feature-rich, entry-level firewall, robust functionality

1

VPN Performance (Gbps)

The Clavister PolarBear Series is a set of network security products designed for telecom 1 024 2 048 operators and large-scale data centers requiring high performance, excellent scalability and 250The Clavister P8 is an extreme 500powerful firewall solution with a wide robust functionality. cOS Stream range of options to meet Clavister the toughest performance targets for telecoms operators and 19”Based Rack Mountable (1U) large-scale data centers. on µTCA (MicroTCA) platform, it delivers up to 80 Gbps in clavister PolarBearSeries its base configuration, with capacity up to 240 Gbps in a single 1U 19” rack mount. This Clavister P8 makes the Clavister P8 the perfect solution for telecoms operations and large-scale data Clavister PolarBear Series – highest performance and scalability, smallest footprint centers where performance demands are ever increasing.

Virtual Interfaces (VLAN)

Support for Clavister Application Control

clavister Clavister Virtual Series Specifications

20

5 000 000

Fast, powerful firewall

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

Powerful firewall

40

Unified Centralized Management 10 Clavister P8

Management/High Availability Ports

24

Clavister V3, V5, V7, V9

Low resource requirements

Clavister Lynx Series – rugged and durable, with outstanding performance

Key Features

23

Key Features

Virtual Interfaces (VLAN)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

Ethernet Interfaces

VirtualSeries

The Clavister Virtual Series is a set of network security products designed for virtual and cloud-based security, offeringClavister excellent performance, powerful.................................................................................................. security features and is P9 Chassis resource efficient. The Clavister Virtual Series offers powerful security features for your virtual environment and is easy to deploy your in market-leading VMware virtualization environIn conclusion… ............................................................................................................ ments. Its minimal footprint and extremely low resource requirements makes the Clavister V Series an optimal solution for all types of virtual and cloud-based network security solutions.

Clavister Series Specifications Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogansVirtual are trademarks or registered trademarks of Clavister AB. Key Benefits Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject toV3 change without V5 prior notification. V7

CID: toc (2012/06)

Clavister X8 is perfect for tough environments, such as remote industrial locations, offshore LynxSeries installations and other demanding environments where high-end security is required. Clavister X8

Clavister P9 Blade ..................................................................................................... 22

Key Features

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

The Clavister W7 is targeted towards large data centers, service providers and high-end 2 x 1GbE (RJ45) enterprise backbone security solutions. Clavister W7 delivers incredible performance, up Virtual Interfaces (VLAN) 256mount and is perfect for situations 512 where security is first to 20 Gbps in a single 1U 19” rack Virtual Routers priority and speed is key to getting 10the job done. 25 Clavister OS

40

Firewall Performance (Gbps)

Management/High Availability Ports

ister E7

5 000 000

Virtual Interfaces (VLAN)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

CLAVISTER WOLF SERIES

izations with a large headquarters stunning performance, up to 16 ” rack mount. With dedicated the Clavister W5 is the easiest t-proof, clustered solution.

Concurrent Connections

Management/High Availability Ports

400

gleSeries

ellent scalability and robust

10

Concurrent VPN Tunnels (IPsec)

Clavister Wolf Series – high performance, excellent scalability and robust Concurrent Connections 500 000 1 000 000 functionality Concurrent VPN Tunnels (SSL/IPsec) 500/500 1 000/1 000

CLAVISTER WOLF SERIES

network

vister

20

VPN Performance (Gbps)

Virtual Routers

VPN Performance (Mbps)

W8 Pro

Firewall Performance (Gbps)

Ethernet Interfaces

6

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. uct names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

dquarters p to 16 ated asiest .

W8

Support for Clavister Security Subscription

2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) Virtual Routers

Clavister W7.............................................................................................................. 16

Clavister W8 Specifications clavister Key Benefits

Clavister W8 Specifications

Excellent value for money

Support for Clavister Security Subscription Firewall Performance (Gbps) 3

Management/High Availability Ports

Clavister W8

Massive firewall performance

Clavister W5 .............................................................................................................. 15

CLAVISTER LYNX SERIES

Comprehensive connectivity

WolfSeries

Clavister W3 .............................................................................................................. 14

CLAVISTER POLARBEAR SERIES

that needs premium network

Massive firewall performance

The Clavister W8 is targeted towards large data centers, service providers and world-class enterprise backbone security solutions. The Clavister W8 delivers incredible performance, up to 40 Gbps in a single 1U 19 rack mount.

Clavister application control ........................................................................................11

Clavister product portfolio ............................................................................................. 13

CLAVISTER LYNX SERIES

Clavister Wolf Series – high performance, excellent scalability and robust functionality

Our customers ............................................................................................................ 9

Clavister technology ..................................................................................................... 10

CLAVISTER POLARBEAR SERIES

Key Features

WolfSeries

Customer references ...................................................................................................... 8

CLAVISTER POLARBEAR SERIES

Clavister W8

Telecoms solutions ...................................................................................................... 7

CLAVISTER POLARBEAR SERIES

WolfSeries

LynxSeries

Cloud solutions ........................................................................................................... 5

Enterprise solutions ..................................................................................................... 6

CLAVISTER VIRTUAL SERIES

clavister

speed is required.

CLAVISTER WOLF SERIES

ellent scalability and robust

or larger remote/branch offices or er W3 delivers next-generation xibility and robust features without

Solutions overview.......................................................................................................... 4

VirtualSeries PRODUCTS AND SOLUTIONS

ork

Core values Some of the core values we bring to our customers are: clavister Innovative design Not only do our products look great, our software is also designed to be clear and concise to help administrators get the job done with minimal difficulty. Clavister X8 Simplicity Clavister Lynx Series – rugged and durable, with outstanding perforEverything we do contributes to making your job easier; from finding the right product, and ordering it to installing, configuring, mance deploying and operating it. We strive to make your life easier. The Clavister X8 is targeted at those installations where standard security products are Extreme performance unable to function reliably. With its industrial, rugged design, the durable Clavister X8 can The need for speedwithstand is vital in industrial today’s connected Ifsolid your network is congested, your customers are going to complain. We harsh, environments and deliverworld. outstanding performance. It deliver extreme performance. also offers unified security management between office and industry environments. The clavister

Clavister delivers the security solutions required for clavister market leaders to optimize their networks – today Clavister W8 and tomorrow. Driven by a passion for innovative design, simplicity and extreme performance, we Clavister Wolf Series – high performance,offer excellent scalabilityof and robust Clavister V3, V5, V7, V9 a portfolio high performance network security functionality products designed specifically for Cloud, Enterprise Clavister Virtual Series – excellent performance, feature-rich and efficient and Telecoms environments. The Clavister W8 is targeted towards large data centers, service providers and world-class The Clavister Virtual Series is a set of network security products designed for virtual and Clavister worldwide enterprise backbone security solutions. The Clavister W8 delivers incredible performance, cloud-based security, offering excellent performance, powerful security features and is up to 40 Gbps in a single 1U 19 rack mount. Founded in 1997, we have a long history of providing resource efficient. The Clavister Virtual Series offers powerful security features for your virtual environment and is easy to deploy your in market-leading VMware virtualization environnetwork security some of the most mission-critical The fiber-centric approach of the Clavister W8 makes it a premium choice as for the key ments. Its minimal footprint and extremely low resource requirements makes the Clavister V firewall in a future-proofed installation and the perfect solution where security and networks inpremium the world. clavister Series an optimal solution for all types of virtual and cloud-based network security solu®

CLAVISTER VIRTUAL SERIES

CLAVISTER WOLF SERIES

fices or ation s without

Contents

About Clavister ............................................................................................................... 3

CLAVISTER POLARBEAR SERIES

robust

Clavister Products and Solutions

18

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, Sweden Phone: +46 (0)660 29 92 00 | www.clavister.com Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB.

CID: p9-chassis (2012/06)

Copyright Š 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.


ComGuard

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving our customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. Our strength is in protecting infrastructure and data across the entire IT landscape: making every device - whether on a desk or in a data center, in a pocket or a virtual machine, or in the cloud - as secure as possible. Our solutions identify and remediate the vulnerabilities that are the basis for cyber-attacks, as well as mitigate internal threats that arise from the accidental or intentional misuse of system or device privileges. In short, we protect from both the external and internal threat.

PowerBroker Express enables organizations to manage access to any SSH-supported device – routers, firewalls, Windows devices, and more – effectively extending security and compliance controls across the entire IT network infrastructure. PowerBroker Express is a full-featured session monitoring tool, complete with comprehensive logging down to the keystroke level, ensuring that no improper action escapes scrutiny.

PowerBroker Servers empowers IT organizations with the ability to delegate root tasks and authorization on Linux, UNIX, and Mac OS X platforms without ever disclosing the highly sensitive root password. PowerBroker Servers utilizes highly flexible policy language to enable enterprises to dictate permissions for users down to the most granular level, extending to any command executable on a UNIX, Linux, or Mac OS X server. This capability along with PowerBroker Servers’ audit-ready logging and comprehensive reporting combine to deliver a solution that enables businesses of every size and industry to satisfy critical internal and external compliance requirements.

Automate Password Management for Increased Security PowerBroker Password Safe Meets Compliance Mandates by Auditing and Managing Passwords PowerBrokerÂŽ Password Safe is an Automated Password Management (APM) solution for access control, manageability and audit of all types of privileged accounts such as shared administrative accounts, application accounts, and local administrative accounts. PowerBroker Password Safe offers complete device support for any operating system, account or device. PowerBroker Password Safe is a critical component of BeyondTrust Privilege Identity Management (PIM) solutions. PowerBroker Password Safe secures access to privileged accounts.

Prevent data loss and achieve compliance with PowerBroker DLP Loss of customer account details, exposure of confidential information and theft of sensitive data cost companies up to 5% of revenue every year. Insiders, employees and contractors who have authorized access to confidential data, are responsible for 70% of total data leaks. Protect your most important assets with the simplest, most powerful, and easiest to deploy data protection solution on the market.

Effectively Secure Data Assets and Maintain the Integrity of Critical System Configurations Significantly Reduce the Cost of Compliance. PowerBroker Databases Monitor & Audit helps Director’s of IT, IT Security, and IT compliance address the threat to data security and compliance posed by un-controlled privileged database users. It provides a complete solution by addressing this threat across the privileged credential life cycle including credential discovery, management, fine grained privilege delegation, privileged user activity monitoring, closed loop activity reconciliation, and automated compliance reporting. These capabilities are packaged for rapid deployment of pragmatic data security and compliance solutions making the time to value on a PowerBroker Databases investment very short. PowerBroker Databases Monitor & Audit offers the best economic value in the market today, to ensure the compliance of your heterogeneous DB environment

eEye Digital Security has made vulnerability management simpler and more effective by providing the only unified vulnerability and compliance management solution that integrates assessment, mitigation, and protection into a complete offering. With a proven history of innovation, eEye has consistently been the first to uncover critical vulnerabilities and prevent their exploit. eEye leverages its world-renowned research to create award-winning solutions that strategically secure critical IT assets and the data they hold. Thousands of mid-to-large-size private-sector and government organizations, including some of the most complex IT environments in the world, rely on eEye solutions to protect against the latest known, unknown and zero-day vulnerabilities. Retina CS enables IT Security professionals to centrally manage organization-wide IT security - physical, virtual, mobile and cloud from a single, web-based console. It is the only unified vulnerability and compliance management solution that integrates security risk discovery, prioritization, remediation, and reporting, which dramatically decreases the time and effort required to manage IT security. Retina Network Security Scanner, the industry’s most mature and effective vulnerability scanning technology, identifies known and zero-day vulnerabilities to protect your organization’s valuable assets. Powered by the Retina Network Security Scanner technology, Retina Community is a FREE vulnerability assessment solution (32 IPs) that enables zero-day identification, and configuration auditing for networked and virtual environments.

Delegate Root Tasks and Authorization in Virtualized Datacenter Environments PowerBroker Virtualization provides a dedicated solution for delegating root tasks and authorization in virtualized datacenter environments without ever disclosing the highly sensitive root password. The product adapts to the increasing scale and complexity of rapidly changing virtual and cloud environments, allowing for secure and efficient deployment and expansion within any IT infrastructure. PowerBroker Virtualization’s highly flexible policy language enables enterprises to dictate permissions for users down to the most granular level, extending to any command executable on guest operating systems as well as hypervisor hosts

19

Retina Cloud provides cloud-based security and compliance services including external Payment Card Industry (PCI) scans and external vulnerability scans. Retina CS also supports the complete vulnerability management for your private and public cloud assets. Retina.GOV is an integrated end-to-end vulnerability and compliance management solution designed to help Government departments and agencies with protection and compliancy by defining and monitoring relevant IT controls. The Retina Web Security Scanner is a best-in-class web scanning solution that rapidly and accurately scans large, complex websites and web applications for vulnerabilities.

20


ComGuard

HP Enterprise Security Solutions - Delivering Security Intelligence and Risk Management HP is radically changing the enterprise security landscape with its Security Intelligence Platform. The HP Security Intelligence Platform uniquely leverages advanced threat research and powerful correlation of security events and vulnerabilities with contextual data to deliver security intelligence spanning IT operations, applications and infrastructure. Based on market-leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence Platform enables enterprises to take a proactive approach that integrates security correlation, deep application security analysis, and network-level defence mechanisms, all backed by our best-of-breed range of information security services HP ArcSight Security Intelligence The HP ArcSight Security Intelligence platform helps safeguard your business by giving you complete visibility into activity across the IT infrastructure: external threats such as malware and hackers; internal threats such as data breaches and fraud; risks from application flaws and configuration changes; and compliance pressures from failed audits. ArcSight is the industry’s leading security information and event management (SIEM) solution for collecting, analyzing and assessing security events. The result is rapid identification, prioritization and response to cybersecurity attacks and insider threats. Only ArcSight correlates users, logs and NetFlow to understand the who, what and where of information security. HP ArcSight ESM Automate Pattern Analysis Protect Critical Application Transactions Secure Sensitive Data HP ArcSight Express Integrate Correlation and Log Management Automate Security Operations Search Through Terabytes of Log Data In Seconds HP ArcSight Logger Store And Manage All Enterprise Log Data Automate Compliance Reporting Gain Business Intelligence For Logs HP Fortify Software Security Center HP Fortify Software Security Center is a suite of tightly integrated solutions for fixing and preventing security vulnerabilities in applications. It eliminates software security risk by ensuring that all business software— whether it is built for the desktop, mobile or cloud—is trustworthy and in compliance with internal and external security mandates. HP Fortify Software Security Center secures all software in the enterprise, regardless of whether it is developed in-house, procured from 3rd party vendors, or running in production. HP Fortify Software Security proactively identifies and eliminates the immediate risk in legacy applications, as well as the introduction of systemic risk during application development. This is done through: Security testing – identify vulnerabilities throughout the application lifecycle with static, dynamic or integrated application testing. Secure development – automate the management, tracking, remediation, and governance of enterprise software risk.

21

HP TippingPoint HP TippingPoint provides pro-active network and cloud security to protect against today’s advanced cyber threats. With increased threat sophistication, use of personal mobile devices, new compliance requirements, growth in cloud computing, and the ubiquitous use of recreational applications, security managers now have more risk to manage and more attack surface to defend. HP TippingPoint’s next generation network security solutions provide flexible and modular security for defending your applications, networks and data from today’s advanced persistent threats and high-profile attacks. Next Generation Intrusion Prevention System (NGIPS) TippingPoint NGIPS delivers an adaptive security Intrusion Prevention System to protect against cyber threats that target applications, networks, and critical data. It can give you new levels of in-line, real-time intrusion protection and proactive network security as your networks and data centers evolve and grow. Next-Generation Firewall (NGFW) HP TippingPoint Next-Generation Firewall gives you application visibility and control. HP TippingPoint now delivers a new series of next-generation firewalls built with proven network security intelligence. This easy-to-use firewall appliance delivers reliability, high-performance, security effectiveness, and granular application visibility and control, allowing your organization to improve your security posture and harden your network defense. Security Management System (SMS) The HP TippingPoint Security Management System (SMS) appliance gives you global vision and security policy control for your large-scale deployments of all HP TippingPoint products, including the HP TippingPoint Next Generation Intrusion Prevention Systems (NGIPS), Core Controllers and SSL appliances. It delivers robust management functionality and flexible deployment. Multiple models are available to match your current requirements and provide a growth path Damballa is the leading provider of security solutions that protect enterprise, ISP and telecommunication networks against advanced malware, persistent threats, and zero-day targeted attacks. Damballa’s unique approach rapidly identifies the command-and-control infrastructure used by criminal operators to exfiltrate data from assets and devices infected with malware. Our signatureless solutions improve security both inside and outside the network perimeter and stop threats traditional prevention solutions miss. Damballa identifies the severity and intent of these attacks even when the malware evades detection. For Enterprise Networks Damballa Failsafe is the leading solution for detecting and terminating persistent threats and targeted attacks in enterprise networks. Damballa Failsafe hunts for hidden infections and undetected threats by monitoring and analyzing egress, proxy and DNS traffic, and detecting and analyzing suspicious file downloads. By correlating suspicious network activity, Damballa Failsafe can pinpoint infected assets while profiling the severity of the threat and providing full forensics regarding threat activity and the criminal operators behind the threat. For Service Provider Networks Damballa CSP is protecting some of the largest cable and wireless ISP networks in the world. By monitoring DNS activity to detect infected subscribers, Damballa CSP is a ‘light weight’, highly scalable and powerful solution for identifying network abuse and infected subscribers. Advanced Threat Intelligence Damballa FirstAlert is the advanced cyber threat intelligence system that powers the Damballa Failsafe and Damballa CSP offerings. Damballa FirstAlert detects emerging threats long before the rest of the security industry has discovered and analyzed the related malware, and it is based on more than a half a decade of global DNS traffic monitoring and malware analysis, superior machine learning technology, six patents pending and backed by some of the world’s leading authorities in cyber threats and criminal networks

22


ComGuard

ComGuard

Entuity is the first network management solution vendor to recognize its importance and deliver a solution for Green IT creating another way to address strategic business processes, reduce costs, and reduce IT environmental impact. Entuity Network Professional Edition (NPE) offers a network management solution for small to medium sized organizations leveraging the enterprise-class engine of Entuity Enterprise. Entuity is One Product Providing Many Solutions IT organizations need in-depth infrastructure management to provide: Resource Management Effective resource management requires an understanding of which devices, systems or links are under or over-utilized. A lack of insight into how resources are utilized can result in either unnecessary investments in additional hardware or result in poor network performance that impacts applications and users. Capacity Planning and Decision Support Knowing which devices and systems support which applications enables informed decisions about the future of your infrastructure. Historical trend reports provide key indicators to help predict future resource requirements. With the right information in place, the ability to make incremental capacity adjustments is far simpler than guessing with capacity plans made too far in advance. Compliance and Audit SOX, PCI-DSS, GBLI all require traceability of transactions and protection of corporate and consumer data. Network management provides an essential component of a complete compliance strategy through the ability to maintain current network documentation and inventory. The ability to keep up-todate documentation is essential for IT organizations to prove compliance and pass audits. SLA Management Service Level Agreements (SLAs) form the basis of how IT will deliver services and applications to endusers and customers. The reliable delivery of services and positive user experience requires a robust infrastructure that is proactively monitored and measured constantly. Alignment of the network to the business is essential to maintaining consistent service levels Troubleshooting Preventing outages by detecting faults or anomalous behavior before they become widespread and impacts business continuity is essential. The ability to pinpoint problems sooner and identify root causes faster increases network reliability and focuses your resources on the problem more efficiently. Cloud Monitoring Regardless of where your applications and infrastructure are hosted, the network will continue to provide critical connectivity to drive business productivity and profitability. Green IT Initiatives Tangible reductions in operational costs and increased resource utilization are now possible through Green IT initiatives. Reductions in data center footprints, power consumption and cooling requirements all contribute to cost savings and decreasing an organization’s energy footprint. It is possible to generate ever further savings by monitoring device power ratings, server efficiency and establishing corporate shutdown policies.

23

WildPackets® develops hardware and software solutions that drive network performance, enabling organizations of all sizes to analyze, troubleshoot, optimize, and secure their wired and wireless networks. WildPackets’ technology provides greater real-time visibility into the network, precision expert analysis, and a superior user interface that reduces training costs and speeds problem resolution time. Unique products and excellent customer support have consistently yielded a customer renewal rate greater than 90%. Our solutions and services address converged networks, application performance, virtualization, 802.11n, VoIP, and other enterprise IT challenges. Sold in over 60 countries through a broad network of channel and strategic partners, WildPackets products are deployed in all industrial sectors, including 80% of the Fortune 1000. . WildPackets® network performance management solutions give network engineers realtime visibility into every part of the network simultaneously from a single interface, including Ethernet, Gigabit (1G), 10 Gigabit (10G), 40 Gigabit (40G), 802.11a/b/g/n wireless, VoIP, and Video links to remote offices. WildPackets® offers both portable and distributed solutions for monitoring, analyzing, and optimizing enterprise networks and applications. OmniPeek network analyzers perform deep packet inspection, forensics, troubleshooting, and packet and protocol analysis of wired and wireless networks. The OmniPeek console connects to Omnipliance and TimeLine network recorders and OmniEngine software probes to monitor and analyze NetFlow, sFlow, and packet data at remote locations throughout the network. WatchPoint brings the data collection and expert Analysis capabilities of NetFlow, sFlow, and packet data to an entirely new level by offering Web dashboard-style reporting unprecedented visibility network traffic and application performance trends and behavior across the entire enterprise. With our solutions, IT administrators can: Rapidly resolve network issues in real-time, before they become major problems Optimize network and application performance Baseline the entire network to understand the impact of deploying new technologies, such as VoIP or video Mitigate security threats Improve overall end-user productivity CIOs and Business Managers can: Easily communicate service level compliance to the organization Audit and track network activity for HR compliance violations See the financial effect of new application deployments Allocate IT Capital Expenditure budgets more efficiently Key Products: WildPackets distributed network analysis solutions give network engineers real-time visibility into every part of the network, and WatchPoint® for enterprise-wide network monitoring and reporting. WildPackets’ distributed network analysis solutions include: OmniPeek® network analyzer OmniEngine™ software probe Omnipliance® network recorder TimeLine™ network recorder

24


ComGuard

ComGuard

Courion Corporation is the leader in identity and access management (IAM) solutions that effectively and securely manage user access risk. More than 14 million users in 500 organizations worldwide rely on Courion’s access risk management solutions to align user access privileges with corporate and regulatory governance policies. Courion solutions enable organizations to quickly identify, quantify and manage access risks to vital information such as intellectual property, medical records, personally identifiable information and customer data, while demonstrating compliance with regulatory requirements. Courion’s cloud and on-premise solutions offer full arrays of IAM functions such as: identity and access governance, user provisioning and password management, in affordable packages that deliver faster time to value than other industry solutions. Access Insight™ Powered by an underlying access intelligence engine, Access Insight identifies associations and patterns in user access privileges that might violate compliance guidelines of company policies. The structure of the product’s access intelligence cube helps organizations create near-real-time graphical profiles of the most critical security risks to information — replacing manual data sorting and risk scoring that lacks context, and a connection to business priorities. ComplianceCourier™ Courion’s access certification and compliance management solution provides organizations with the ability to automate the verification and remediation of access rights. It extends the responsibility and accountability for compliance to the most appropriate resources, enabling business users to monitor and enforce access to sensitive data and other vital corporate assets. Powerful analysis tools provide a visually rich interface that makes it simple to monitor compliance and reduce enterprise risk. RoleCourier® Courion’s role lifecycle management solution automates role creation and ongoing role management, enabling organizations to effectively align business roles with IT accounts and access rights. This access governance tool employs a unique hybrid approach combining “top-down” role design and “bottom-up” role mining to create a platform for robust long-term role lifecycle management that easily adapts to today’s changing business environment. Compliance Manager for File Shares Compliance Manager for File Shares is Courion’s complete solution for ensuring that user access to file shares is aligned with corporate security policies and industry regulations -- allowing organizations to identify the riskiest file share assets in their organization, enabling them to focus efforts on the areas where they can have the greatest impact on reducing risk. AccountCourier® Courion’s user provisioning solution enables enterprises to fully automate new hire, promotion/ transfer and termination processes. With its flexible workflow engine and ability to connect to multiple authoritative sources, Account Courier provides a common access management environment for both IT accounts and physical assets. Access Request Manager Courion’s Access Request Manager is a streamlined access request interface that makes it simple for authorized users to request access for themselves and others. Access Request Manager provides an easy-to-follow, guided format for presenting access rights that you define for users in your organization. PasswordCourier® Courion’s password management solution enforces consistently strong password policies and enables users to instantly and securely reset their own passwords on enterprise systems, applications and Web portals. Transparent synchronization lets users use one password to access multiple systems, improving convenience, enhancing security and increasing adoption. Multiple self-service entry points are available, such as Web, desktop PC, voice authentication, IVR or via support staff.

25

Deliver On

Ixia’s award-winning solutions are used worldwide by network equipment manufacturers, service providers, enterprises, and governments to: Assess and optimize network performance, validate compliance, and harden security. Gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. Harden mission-critical networks against attack and train personnel to recognize and eradicate vulnerabilities. Improve performance, security, and application delivery of cloud, data center, and network services.

Key Statistics Publicly traded: XXIA (Nasdaq) Founded in May 1997 IPO in October 2000 Launched first 10GE testing solution in Q1, 2001 Complete layer 2-7 solution in 2001 Delivered world’s first 100GE test system in 2008 Delivered world’s first 40GE test system in 2009 Acquired wireless test company Catapult Communications in June 2009 Acquired Agilent’s N2X IP test division in October 2009 Acquired Wi-Fi test company VeriWave in July 2011 Acquired leading network visibility provider Anue Systems in June 2012 Acquired actionable security intelligence (ASI) pioneer BreakingPoint in August 2012 Technologies Solution Leader Wireless, 4G/LTE, and Wi-Fi devices and systems - provides large-scale handset emulation and realistic subscriber modeling to test the performance of nextgeneration access and core devices; verifies performance and security of Wi-Fi networks and devices: Wi-Fi AP and LAN controllers, client devices, residential gateways and routers, and Ethernet switches and branch office routers. Virtualization and Cloud Computing -validates virtualized infrastructure performance and security. Security - preemptively tests the performance, security, and stability of network and security products using actionable security intelligence (ASI). Traffic Visibility - provides traffic visibility and monitoring for production networks, to quickly connect diagnostic troubleshooting products without having to disconnect other monitoring tools from the network Higher Speed Ethernet - verifies service delivery over 40 and 100Gbps links with first-to-market test solutions. Data Center Optimization - Ethernet/Fibre Channel interfaces and protocols to test converged data center networks Ixia’s Powerful and Versatile Network Test and Visibility Solutions: IxNetwork/IxN2X - tests IP routing and switching devices and broadband access equipment. Provides traffic generation and emulation for the full range of protocols: routing, MPLS, layer 2/3 VPNs, Carrier Ethernet, broadband access, and data center bridging. IxLoad - quickly and accurately models high-volume video, data, and voice subscribers and servers to test real-world performance of multiservice delivery and security platforms. IxCatapult - emulates a broad range of wireless access and core protocols to test wireless components and systems. When combined with IxLoad, provides an endto- end solution for testing wireless service quality. IxVeriWave - employs a client-centric model to test Wi-Fi and wireless LAN networks by generating repeatable large-scale, realworld test scenarios that are virtually impossible to create by any other means. BreakingPoint Security - provides global visibility into emerging threats and actionable insight that can be used to harden and maintain resilient networks and data centers. Anue Net Tool Optimizer™ (NTO) - achieves complete network visibility with the easiest drag-and-drop control panel in the industry. Test Automation - provides simple, comprehensive lab automation to help test engineering teams create, organize, catalog, and schedule execution of tests. Innovative Hardware - employs chassis and load modules that enable plug-and-play configuration of technologyspecific protocols, interfaces, performance, impairment, and load density for 1/10/40/100GE, ATM-POS, and Fibre Channel networks.

26


ComGuard

ComGuard

BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. Enterprises and government agencies worldwide trust BlueCat to manage millions of devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization and cloud automation. Our innovative solutions and expertise enable organizations to build a network infrastructure that is more scalable, reliable and secure, as well as simplify the transition to nextgeneration technologies including IPv6, DNSSEC, M2M and SDN.

Bluecat DNS/DHCP Server

BlueCat DNS/DHCP Server delivers rock-solid DNS and DHCP for your network. When DNS and DHCP core services fail, business stops – Web sites are unreachable, network-dependent applications including e-mail, ERP, CRM and VoIP cannot function and users cannot find virtual machines or cloud services. Purpose-built to deliver the highest levels of performance, scalability, security and availability, BlueCat DNS/DHCP Server meets the business-critical DNS and DHCP needs of any organization to ensure always-on business connectivity.

BluecatAddress Management (IPAM)

BlueCat Address Manager is a powerful IP Address Management (IPAM) solution that lets you take control of your complex and dynamic network. With integrated core services, workflow and automation, BlueCat Address Manager enables you to centrally manage every connected device on your network from a single pane of glass. BlueCat Address Manager provides network intelligence and insight into the relationship between devices, users and IP addresses that can be put into action to improve security and ensure reliable, always-on business connectivity.

Bluecat Automation Manager

Business users now demand immediate response for everyday IT requests. BlueCat Automation Manager allows you to instantaneously complete critical network requests by automating end-toend IPAM processes and workflow. With BlueCat Automation Manager, you can empower users to request IT changes via a simple self-service portal and dramatically reduce turnaround times for completing those requests. Flexible and extensible, BlueCat Automation Manager can be tailored to your existing systems and processes to deliver immediate value with no staff retraining required. Delphix Transforms Enterprise Application Delivery Organizations spend enormous amounts of time and money to build and support applications that run on databases. Approving, creating and updating copies of databases for application development, troubleshooting, and analysis requires weeks of time and millions of dollars of capital and operating expense. As a result, IT often cannot keep up with business demands for application additions and timely data. Delphix enables agile data management through intelligent software that eliminates redundant infrastructure and slow processes. As a result, Delphix customers deliver better business applications more quickly and at lower cost. The Delphix team has created successful software companies in a variety of markets, including data de-duplication, virtualization, application development, and real-time intelligence and analysis. The Delphix Agile Data Platform is being used today by leading global organizations to cut the time, cost, and complexity of delivering enterprise applications.

R

WinMagic is a leading provider in full-disk encryption solutions. Its SecureDoc line of products ensures protection of sensitive information stored on desktops, laptops, tablet and servers by various means of authentication that range from passwords to hardware tokens, biometrics and PKI. WinMagic’s award winning products fulfill the requirements of even the most security conscious organizations by focusing on concrete security features while offering a zero impact user experience and ensuring maximum security and transparency in regular workflow. Fast & flexible deployment and comprehensive security allows you to streamline IT processes and as a result reduces the total cost of IT network ownership. WinMagic’s SecureDoc Enterprise Edition maintains end user productivity while ensuring maximum security and transparency in regular work flow. Easily integrating with industry-standard technologies such as OPAL-compliant, Self-Encrypting Drives (SEDs), SecureDoc enables organizations to meet internal requirements and government or other regulations to maintain the security and integrity of their data. WinMagic’s best of breed encryption solutions provide unparalleled data protection across all platforms from a single management console while offering a broad variety of device choices for your employees to use. Features & Benefits Scalability & Flexibility Convenient, robust, easy to use and provides more flexibility to IT managers to manage SES Reduced cost of Ownership SecureDoc’s compelling features can help easily manage your BYOD or traditional IT environment and can help you realize quick and tangible savings on your TCO, all the while keeping your data highly secure. With industry-leading full disk encryption technology and industry-first technology like PBConnex™, SES enables customers to streamline their IT processes and as a result, help reduce the total IT cost of ownership. Single ‘pane of glass’ configuration and management SES places all security-related management under one centralized enterprise server, including policies, password rules, and the manageability of encryption across PC, Mac and Linux platforms alike. Working with complimenting technologies Easily integrating with industry-standard technologies such as OPAL-compliant Self-Encrypting Drives (SEDs) and Intel® Anti-Theft Technology. Extended features set beyond PBConnex, SED management, Removable Media Encryption (RMCE) and File and Folder Encryption PCI Compliant Audit capability to prove encryption/compliance Password recovery/helpdesk capability Self-help and help desk capabilities for lost / forgotten passwords, tokens, etc. Certifications include: FIPS 140-2, Common Criteria EAL4, BITS, AES validation, The National Security Agency (NSA) (SECRET level), National Institute of Standards and Technology (NIST) Certificate #1

27

28


ComGuard

ComGuard

Array Networks is a global leader in application delivery networking with over 5000 worldwide customer deployments. Powered by award-winning SpeedCore™ software, Array solutions are recognized by leading enterprise, service provider and public sector organizations for unmatched performance and total value of ownership. Array is headquartered in Silicon Valley, is backed by over 300 employees worldwide and is a profitable company with strong investors, management and revenue growth. Poised to capitalize on explosive growth in the areas of mobile and cloud computing, analysts and thought leaders including Deloitte, Red Herring and Frost & Sullivan have recognized Array Networks for its technical innovation, operational excellence and market opportunity. APV Series Application Delivery Controllers APV Series Application Delivery Controllers improve the availability, performance and security of applications and IP data services while increasing server efficiency and reducing cost and complexity in the data center. APV integrates SSL acceleration with Layer 2-7 load balancing, acceleration, Web application security and a rich ADC feature set to improve efficiency and performance for delivering secured applications. AG Series Secure Access Gateways Array Networks AG Series Secure Access Gateways provide scalable, mobile-ready secure access to enterprise and cloud applications for any user, anywhere on any device – protecting data while enabling true anywhere-to-anywhere connectivity. Also provides centralize control over access to business critical resources, providing security for data in motion and at rest and enforcing application level policies on a per user basis. aCelera WAN Optimization Controllers Array’s aCelera physical and virtual WAN optimization controllers dramatically reduce application response times over wide area networks by reducing the amount of traffic that goes over the network between remote offices and data centers. Where scalability and performance across WANs are critical factors, aCelera physical appliances reduce response times for enterprise applications by more than 95% by mitigating the effects of limited bandwidth, high latency, packet loss and network congestion.

AirTight Networks is the global leader in WIPS (Wireless Intrusion Prevention System) and secure Wi-Fi solutions. The company’s award winning family of products and cloud services brings together a true carrier-class multitenant cloud architecture, breakthroughs in Wi-Fi analytics, manageability, ease-ofdeployment and cost-effectiveness, as well as AirTight’s longtime top-rated WIPS technology. Wireless Intrusion Prevention System (WIPS) Without the right tools to understand what is happening in your airspace, your business is exposed. Misconfigured access points, a rogue (unauthorized) access point, an employee connecting to a neighbor’s network or a hacker sitting in your parking lot - all these can open a back door into your enterprise network and compromise your data. AirTight WIPS (formerly SpectraGuard Enterprise) is consistently recognized as the industry’s top rated wireless IPS solution and is the solution of choice for security conscious organizations. Wireless LAN Solutions for the Enterprise AirTight Wi-Fi provides all the enterprise WLAN features including content filtering, firewall, QoS, admission control, traffic shaping, and BYOD device onboarding. AirTight has a family of customengineered, software configurable Wi-Fi APs, including its C60 platform that is dual-radio, dual concurrent, and industry’s only that can deliver 3x3:3 performance on 802.3af power budget and can also provide dedicated 24/7 WIPS protection concurrent with 802.11n access. Secure Cloud WiFi Service The AirTight cloud can scale for ten to tens of thousands of locations or devices. It is multi-tenant – separating customer accounts, configuration, and data. In fact, AirTight is the first and only cloud based Wi-Fi and WIPS vendor that can also enable multi-tenancy within a specific customer account (e.g., corporate vs. franchisee, or across multiple brands) using AirTight’s patented hierarchical location based architecture.

Audit your website security with Acunetix Web Security Scanner

Website security is possibly today’s most overlooked aspect of securing the enterprise and should be a priority in any organization. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases.

Ping Identity sells a security system that grants users access to different applications via one password and login page. Boeing, Aflac and Shell are customers. CEO Durand previously founded Jabber Inc., an open-source instant messaging company that sold to Cisco in 2008. Ping has raised $21 million in venture funding from Volition Capital, Draper Fisher Jurvetson and others in June 2011. Ping Identity’s rapidly deployable Internet-identity security platform for browser-based single sign-on (SSO), identity-enabled Web Services, and associated user-account management. Using standardsbased identity federation, PingFederate provides an organization’s network users with secure access to Web applications or other Internet resources across domains, without the need for repeated logons. PingFederate thus eliminates the proliferation of passwords and reduces the operational overhead associated with managing multiple user accounts. For organizations needing secure SSO to Software-as-a-Service (SaaS) providers, PingFederate also offers optional connection templates and automated user provisioning for selected SaaS applications (including Salesforce and GoogleApps). This option allows you to leverage existing identity-management investments—thus eliminating the need to replicate and expose any confidential user data over the Internet.

Firewalls, SSL and locked-down servers are futile against web application hacking Any defense at network security level will provide no protection against web application attacks since they are launched on port 80 - which has to remain open. In addition, web applications are often tailor-made therefore tested less than off-the-shelf software and are more likely to have undiscovered vulnerabilities. Acunetix WVS automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities. Acunetix Web Vulnerability Scanner is an industry leading web vulnerability scanner that scans websites and web applications for a large variety of vulnerabilities. Network-level defense mechanisms such as firewalls, SSL and properly configured servers provide no protection against web application attacks. This is because web application attacks are performed on port 80 or port 443, which are the ports that need to remain open. Additionally, since web applications are often tailor-made to serve specific business requirements, testing for vulnerabilities tends to be less rigorous than off-the-shelf software. Acunetix Web Vulnerability Scanner is able to automate and significantly speed-up the penetration testing process by subjecting web applications to several hundreds of different attack vectors for attacks such as SQL Injection, Cross-Site Scripting and Cross-Site Request Forgery. Any vulnerabilities found are reported and accompanied by information detailing the impact of the vulnerability and how to fix them.

29

30


ComGuard

ComGuard

External hardware-based removal of viruses, spyware, trojans, rootkits and more that

IT Security Professional Certifications

cannot be removed by software security programs

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization

The FixMeStick $59.99 MSRP

that certifies individuals in various information security and e-business skills. EC-Council has been

ÂŽ

VIRUS REMOVAL DEVICE

Hardware-based detection and removal of viruses, spyware, trojans, rootkits, and more that

VIRUS REMOVAL DEVICE

External cannot be removed with software security products. hardware-based removal of Runs trojans, from a USB device and doesn’t install software viruses, spyware, rootkits and more that with your work and play. cannot be removed by software security Rapidprograms reaction to new and emerging threats with

certified by American National Standards Institute to meet its ANSI 17024 standard. CSCU, ECCouncil Basic Computer Security Framework for Enterprise End Users is based on a comprehensive

so it won’t slow down your PC or interfere

analysis of fundamental information security job roles and critical information security controls. The framework encompasses the established standard, guidelines and frameworks available for

intelligent scanning that uses 3 unique

computer security from an end user perspective. CSCU completely maps to EC-Council Basic

scanners from Kaspersky Labs, Sophos, and VIPRE.

Computer Security Framework for Enterprise End Users.It is the owner and creator of the world

Not a replacement for antivirus programs, which protect PCs from infections, the FixMeStick is

famous Certified Ethical Hacker (CEH), EC-Council Secure Programmer.Net (ECSP.NET), Computer

• Hardware-based detection and removal of viruses, spyware, trojans, rootkits, and more that cannot be removed with software security products.

• Runs from a USB device and doesn’t install software so it won’t slow down your PC or interfere with your work and play. • Rapid reaction to new and emerging threats with intelligent scanning that uses 3 unique scanners from Kaspersky Labs, Sophos, and VIPRE.

for removing infections that get past the antivirus.

• Not a replacement for antivirus programs, which protect PCs from infections, the FixMeStick is for removing infections that get past the antivirus.

Updates are automatically downloaded and stored on the FixMeStick.

• Updates are automatically downloaded and stored on the FixMeStick. • Valid for one year from the date of first use. Recharges available at www.FixMeStick.com.

FMS9ZAFSTD

Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 87 countries through a training network of more than 450 training partners globally. As of January 1st, 2012 EC-Council has trained over 120,000 individuals and certified more than

“EXCELLENT”

50,000 security professionals. Many of these certifications are recognized worldwide and have NSFOCUS Information Technology Co., Ltd.is one of the first high-tech companies in China

received endorsements from various government agencies including the US Federal Government

dedicated to network security. Our global presence allows us to deliver timely and effective

via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security

services to our customers, regardless of where they’re located. NSFOCUS has built and maintains

Systems (CNSS). And the United States Department of Defense has included the CEH program

an exhaustive database of threats, vulnerabilities, and other malware that is recognized as a

into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer

standard throughout the industry. NSFOCUS also does in-depth research in fields such as

Network Defenders Service Providers (CND-SP)

FixMeStickŽ Technologies. All rights reserved. FixMeStick and the FixMeStick logo are trademarks of FixMeStick Technologies. All other trademarks are trademarks of their respective owners. Questions? 1-888-530-6125 or visit us at www.FixMeStick.com Š Copyright FixMeStick Technologies, Suite #210, 376 Victoria Ave, Montreal, QC, H3Z 1C3, Canada

intrusion prevention techniques, anomaly traffic detection, analysis and sanitization, operating system and application security, security vulnerability detection techniques, security product

Individuals who have achieved EC-Council certifications include those from some of the finest

bugs and detection, as well as worm and virus prevention.

organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations.

NSFOCUS ANTI-DDos SYSTEM Today’s DDoS attacks are more virulent, more destructive, and more focused than ever. They can easily elude and overwhelm most common defenses. Composed of legitimate-appearing requests, spoofed identities, etc., these highly sophisticated attacks make it virtually impossible to identify and block. DDoS attacks paralyze their targets, prevent them from conducting business, and cost companies billions of dollars in lost revenue every year. Consistent with its position as a global leader in active perimeter security, NSFOCUS’s AntiDDoS System (ADS) is designed to defend everyone from small to medium-sized enterprises all the way up to carrier-class providers against damaging DDoS attacks. Not only does the ADS defend, but cleans the traffic to allow critical business functions to continue, keeping your

Fox Business News, CNN, The Herald Tribune, The Wall Street Journal, The Gazette and The Economic Times as well as in online publications such as the ABC News, USA Today, The Christian Science Monitor, Boston and Gulf News. EC-Council is the owner of the Hacker Halted conference and workshop series, which had been organized in international cities such as Miami, Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, among others. Hacker Halted features renowned international speakers who are experts in the field of information security. The objective of Hacker Halted conference series is to raise international awareness towards increased education and ethics in information security. The EC-Council University, based in the state of New Mexico, United States of America, is a fully

business running, even under the most determined of attacks.

licensed degree granting university that offers both bachelors and masters degree programs.

Equipped with a purpose-built operating system and integrating advanced anomaly recognition,

Currently, EC-Council is supporting the International Multilateral Partnership against Cyber Threats

source verification, and anti-spoofing technologies, NSFOCUS’s ADS delivers robust and comprehensive anti-DDoS protection to businesses of all sizes.

31

EC-Council has also been featured in internationally acclaimed publications and media including

(IMPACT) that is a partner organization of the United Nations/International Telecommunication Union (UN/ITU) to provide training and technical support to governments of its 191 member states.

32


Wireless

Wireless

Comguard wireless provides wireless network infrastructure, that includes installations, sales, engineering and project management for the deployment of network systems.We provide training on the use of the systems as well as post installation support. These networks may include, but are not limited to microwave point to point systems, WiMax systems, WiFi, Mesh systems and point to multi-point systems

Cambium Networks’ Point to Point (PTP) radio solutions are providing award-winning network performance in licensed, unlicensed and defined use frequency bands. These include specific FIPS 140-2 solutions for the U.S. Federal market.

With new technologies and solutions driving the pace of change of businesses in the region, the competitive edge increasingly comes from exploiting new opportunities in technology before competitors. In this competitive environment, Comguard has been able to build a successful business quickly by drawing on the best of global solutions. Uniquely in the region, this combination of full support for channel partners and market-leading products for emerging technologies provides both partners and their customers with the full confidence to invest in integrated next-generation IT and networking solutions from Rich media communications to security to bandwidth management that will benefit their businesses.

SOLUTIONS

Complete range of IT – Network, Wireless & Communication solutions for Point-to-Point and Point-to-Multipoint Wireless Connectivity and further related. Carrier-Class Free Space Optics (FSO), Broadband OFDM Radios, WiFi Hotspots, Millimeter Wave, Licensed Microwave, License Exempted RF, Wimax plus complete solutions for Wireless Area Networks and beyond. Our product portfolio caters to: Pre-WiMax Broadband OFDM Radios WiFi APs, CPEs, WDS Integrated WiFi Hotspots Millimeter Wave Radios (MMW) Licensed Microwave Radios(MW) 802.16 WiMAX Platform Free Space Optics (FSO, Optical Wireless) Network Management Systems

Deliverables: Un – paralleled high bandwidth adv. Longer distance backhauls Leased Line E1/T1 Replacement Private and Enterprise Networks Last mile fiber extensions Flexible Deployment Spectral Efficiency Extended Reach Eco Friendly Network Intelligence and Protection

BUSINESS SCOPE 1. Broadband & Telecom operators 2. Private Networks 3. Public Safety & Security networks Carrier ethernet IP network|wimax Enterprise Wireless Business Network Government& Municipality network | bakhaul| cellular backhaul| ISP & WISP| Applications| leased line replacement| Security Surveillance System | IP & broadband internet access wireless WAN outdoor Network| utility, Ethernet video |analog wireless video Wireless ISP solutions Energy & Gas transmission WiMAX backhaul Deliver Broadband Internet Access Replace Leased Access Lines Cellular & mobile network backhaul Leased Line Replacement - eliminate Public Wi-Fi Hotspot Connectivity/ Carry mixed IP/TDM traffic, or migrate to costly telecom costs Backhaul 100% IP Inter-building LAN extension Bandwidth Upgrades for Existing Offer IP and Ethernet services (video, Wireless LAN / WAN / MAN Networks VoIP, gaming) Increase network capacity and reliability Citywide IP Video Surveillance Extend network reach, expand footprint Add redundancy to critical Metro-scale Public Safety Networks Add failsafe redundancy to critical links communication links Multi-site/Building LAN Interconnection Last mile fiber extension Centralize servers, data storage and Military Installation Perimeter Security Wi-Fi network backhaul services backup Secure Wireless WAN / Wireless MAN Backup your current wireline network for Remote video surveillance monitoring, Multi-Location Voice-over-IP failsafe operation video conferencing Traffic Enforcement/Surveillance Offer high-speed Broadband Internet Multi-location voice-over-IP (VoIP) Port/Harbor/Airport Security Monitoring Access Connect remote buildings/networks that Campus/Complex Security Monitoring Offer business-class Ethernet services are miles apart Private Networks Telemedicine and distance learning

33

Cambium PTP 600 Series

Canopy PMP 450

Point to Point Overview Cambium Networks’ Point to Point (PTP) radio solutions are providing award-winning network performance in licensed, unlicensed and defined use frequency bands. These include specific FIPS 140-2 solutions for the U.S. Federal market. Based on breakthrough Orthogonal Frequency Division Multiplexing (OFDM) technology, Cambium Networks’ PTP solutions deliver exceptional near-line-of-sight (nLOS) and non-line-of-sight (NLOS) coverage in locations where foliage, tall buildings or other obstructions limit wireless broadband access. Our PTP solutions are ruggedized for 99.999% reliability to deliver exceptional performance at the most extreme temperatures and under the most difficult weather conditions. Our PTP networks deliver the speeds to support today’s in-demand bandwidth-intensive solutions, including high-speed residential and business access, streaming video and VoIP. Point to MultiPoint overview Canopy wireless broadband access networks deliver the high-speed Internet access, video surveillance, SCADA, streaming video and VoIP applications. These carrier grade last mile solutions provide wireless access connectivity to build fiber, cable and DSL network extensions to reach underserved areas, or expand business networks. Solutions are also used for SCADA and smart grid applications, 3G offload or other broadband communications. Canopy access networks operate in the licensed, unlicensed and federal frequency bands, providing superior performance in a wide variety of spectrums, including 900 MHz, 2.4, 3.5, 3.6, 4.9, 5.1, 5.2, 5.4, 5.7 and 5.9 GHz. With their simple, elegant design and flexible configuration options, our PMP networks lead the marketplace in speed and ease of installation, reducing both cost and time-tomarket and ensuring high performance at an exceptionally low cost of ownership.

EnGenius is the pioneer of Long Range high power wireless solution provider in the telecommunication industry. Stability, sensitivity and penetration capability are our key success factors and competitive edge in achieving customer satisfaction. As a leader of wireless technology, EnGenius stays ahead of the trends and promises to provide high quality products and services to its customers globally. Get connected, get EnGenius.

WISP/Enterprise Outdoor Dual Concurrent AP Outdoor AP/Bridge

SMB Business AP/Bridge

Home / SOHO HOME/SOHO Gateway 3G Router Media Bridge/ Repeater Wireless Adapter

Network Accessories POE Adapaters Antenna Connectors Splitters

34


Wireless

Wireless

The Altai Super WiFi Solution is designed to offer a cost-effective wireless solution for different applications such as 3G/LTE Data Offload, Wireless Broadband, Hotel, University, Container Port, Video Surveillance. Altai’s longer reach Super WiFi technology requires significantly fewer units per square kilometer of coverage with savings of more than 65% and improved latency over conventional mesh systems, making Altai Super WiFi an ideal solution for service providers.

A8 Base Stations Series

A8n Base Station Series

A2 Dual AP Series

U1 USB CPE series

AWMS

Airlive designs, manufacturers, and sells innovative broadband wireless solutions worldwide. The company’s products include disruptive outdoor wireless products which combine industry leading product design built around internally developed core technologies As a company which thrives on innovation and the understanding of customer needs, our products deliver on the price/performance metrics carriers require to build stronger, faster, and smarter wireless networks.

C1 CPE Client Series

Meru Networks provides a virtualized wireless LAN solution that optimizes the enterprise network to deliver the performance, reliability, and operational simplicity of a wired network, with the advantages of mobility. Meru’s innovative approach to wireless networking uses virtualization technology to create an intelligent and self-monitoring wireless network. Additionally, Meru uniquely can support “context-aware application layers” (CALs), which provide isolated and secure channels dedicated to specific applications. With Meru, enterprises can become all wireless, smoothly migrating their business-critical applications from wired to wireless networks. With Wi-Fi from Meru, organizations can: Deal with increasing capacity demands brought on by the Bring-Your-Own-Device (BYOD) phenomenon Meet the increasing wireless demand for bandwidth in support of voice and video applications Deploy and manage their wireless network easily Deliver consistent, high-quality mobile services, so network users can work productively Manage the network infrastructure efficiently and cost-effectively Ensure business applications run reliably over the network, delivering predictable access Provide secure access for all users and guests

35

Meru’s enterprise wireless LAN solutions have been adopted in all major industry vertical markets, including Fortune 500 enterprises, healthcare, education, hospitality, retail, manufacturing, and government. Founded in 2002, Meru is headquartered in Sunnyvale, California, and has operations in the Americas, Europe, the Middle East, and Asia Pacific.

4ipnet is a leading provider of networking total solutions for wireless and wired Connectivity, Management, Security, Mobility and Services. It delivers complete diverse array of innovative, turnkey and high-performance products and solutions, to bring reliability and manageability to evolving complex wired and wireless networking and telecommunication world. 4ipnet’s complete wireless networking infrastructure and management solution portfolio addresses the needs of different network operation environments ranging from the hospitality, education, telecom 3G-offload, ISP, industrial, medical, SMB, to the SOHO, with an emphasis on providing centralized network management, simplified network deployment, and enhanced network security and performance.

36


ComGuard ComGuard

ComGuard

ComGuard

ComGuard

37

38



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.