OUR PORTFOLIO

AlgoSec_Transparent_logo500px

Network Security Policy Management – Business-Driven Security Management. Automate the management and enforcement of security policies across firewalls, routers, virtual private networks (VPNs) and related security devices. Gain complete visibility, automate changes, and always be compliant!
Firewall Analyzer – Visualize complex networks with dynamic network topology map. Auto-discover applications and services. Optimize firewall rulesets, Network segmentation. Reduce firewall auditing time and cost by up to 80% with automated compliance reports!
FireFlow – Security change management automation. Improve accountability for change requests. Proactively assess the impact of network changes to ensure security and continuous compliance.
CloudFlow – Instant visibility, risk assessment and policy cleanup, as well as proactive detection of misconfigurations in the multi-cloud environment.
AlgoBot – The First Intelligent Chatbot for Network Security Policy Management.
AppViz – Provides an application-centric approach to your network security policy management. Discovering, identifying and mapping Business applications. Providing visibility of the network connectivity flows associated with each business application, which in turn provides critical security information regarding the firewalls and firewall rules supporting each connectivity flow.

CTS-Logo_+full_name-01-removebg-preview

CTS

CTS (Connection Technology Systems Inc.) is a world-class FTTX solution provider for Telecoms, ISPs, and Service operators all over the world.

Founded in 1998, Connection Technology System Inc. (CTS) consists of a group of design, technical, and marketing professionals with diverse backgrounds in the communication field and focuses on the professional FTTX and Industrial networking solutions to telcos, network operators, and broadband service providers all over the world.

CTS Solutions product range includes 3 groups of products:

FTTX

  • Fiber Access Switch
  • Fiber CPE Switch
  • Fiber Gateway

Industrial Networking

  • Industrial Switch
  • Industrial Media Converter

Media Converters

  • Media Chassis
  • Media Converter
  • Industrial Media Converter
CNV-Logo_horizontal 200x69

Cubro is a leading manufacturer and global supplier of IT network visibility products that provide Network Monitoring, Security and Analytics Visibility Solutions for Service Providers and Enterprise Networks.

Cubro‘s product range includes:

As transformational technologies like 5G, SDN/NFV, SD-WAN, virtualization, and IoT are being adopted, networks have become increasingly complex with additional ‘blind-spots’.

Blind spots are network traffic that is not visible to network monitoring, security and analytics tools and can hide and obscure network performance and security threats. Today Service Providers and Enterprises must be able to see all of their data and applications in real time to secure and manage their growing networks and traffic demands while improving productivity and keeping watch for security attacks and leaks.

Cubro solutions provide enhanced visibility and control of all data transiting an organization’s network and are instrumental in the successful outcomes of IT initiatives including:

  • 5G/4G/3G Service Assurance and Customer Experience Management
  • Digital Transformation (Cloud)
  • Data Security
  • Next Generation Data Centers (Virtualization)
  • Software Defined Networking
  • High performance
iQsol_Web_RGB

Log Management, Alerting and Disaster Recovery are going hand in hand to ensure your all around Data Center Security.
AMS – Alert Messaging Server – With Alert Messaging Server no alert stays undetected! Never miss out on incidents happening in your IT-Systems. AMS provides you with the entire overview.
LOGAPP – Regulation-compliant logging and SIEM – You want to collect, analyze and manage events of assets such as servers or network devices easily? LogApp can do all of that and even more!
POWERAPP – UPS-Power-Management – Your Energy Guard. Business Continuity Management (BCM) at highest standards: With PowerApp it is ensured that your IT-Assets, Machines and Data stay unharmed even during a longer lasting power blackout.
HAS – Hardware Security Appliance – Fast and simple HSM configuration up to 16 PKI server. This appliance simplifies the central creation and storage of certificates with YubiHSM.

PRIMX Logo 2

Data Encryption solution for advanced protection of sensitive data against loss, theft, disclosure, and economic espionage. Adding additional user right to understand the data.
ZONECENTRAL – Encryption for Files and Folders (NAS, SAN, File Servers)
ZED! – Encryption for Files in Transit (USB, Attachment, HD)
ZEDMAIL – Encryption for Emails (Outlook Plug-in)
ORIZON – Encryption for Cloud Storages (OneDrive, DropBox…)
ZONEPOINT – Encryption for Microsoft SharePoint Libraries
CRYHOD – Full Disc Encryption for Discs and Laptops

retarus-logo

SECURE EMAIL PLATFORM – The complete solution for business Email Security.
EMAIL SECURITY – Premium protection against cyber-attacks.

4-engine AntiVirus MultiScan Patient Zero Detection External Sender Visibility Enhancement
Anti-phishing Anti-Spam Sandboxing
Time-of-Click Protection Attachment Blocker Deferred Delivery Scan
Directory Filter Large Email Handling CxO Fraud Detection
Forensic SIEM integration Email Live Search Monitoring & Reporting…

TRANSACTIONAL EMAILS – Send high volumes of emails directly from your business applications. Newsletters, order confirmations, password resets and status notifications. Achieve a better delivery rate for your transactional emails.
EMAIL ARCHIVE – Store emails in a legally compliant manner.
EMAIL CONTINUITY – Keep emailing even when your email infrastructure isn’t available at the moment.
PREDELIVERY LOGIC – Rule-based email workflows. Analyze and process emails according to content, origin, and other criteria—even before they reach your infrastructure.

Logotype_WALLIX_2020_Black-Orange

Complete solution for protection and management of privileged and regular user access to IT assets and applications.
PAM – Privileged Access Management – Privileged Admin Session Capture, Password Management, Access Management, Application-To-Application Management
IAM – Identity & Access Management – IDaaS, SSO, Context-based Access Control, MFA, Corporate Identity Directories Synchronization, Identity Management solutions for provisioning user accounts and applications.
EPM – Endpoint Privilege Management – Eliminate local Admin rights and stop ransomware.
MFA – Multi Factor Authentication – Strong authentication to verify user identities.