OUR PORTFOLIO

AlgoSec_Transparent_logo500px

Network Security Policy Management – Business-Driven Security Management. Automate the management and enforcement of security policies across firewalls, routers, virtual private networks (VPNs) and related security devices. Gain complete visibility, automate changes, and always be compliant!
Firewall Analyzer – Visualize complex networks with dynamic network topology map. Auto-discover applications and services. Optimize firewall rulesets, Network segmentation. Reduce firewall auditing time and cost by up to 80% with automated compliance reports!
FireFlow – Security change management automation. Improve accountability for change requests. Proactively assess the impact of network changes to ensure security and continuous compliance.
CloudFlow – Instant visibility, risk assessment and policy cleanup, as well as proactive detection of misconfigurations in the multi-cloud environment.
AlgoBot – The First Intelligent Chatbot for Network Security Policy Management.
AppViz – Provides an application-centric approach to your network security policy management. Discovering, identifying and mapping Business applications. Providing visibility of the network connectivity flows associated with each business application, which in turn provides critical security information regarding the firewalls and firewall rules supporting each connectivity flow.

CTS-Logo_+full_name-01-removebg-preview

CTS

CTS (Connection Technology Systems Inc.) is a world-class FTTX solution provider for Telecoms, ISPs, and Service operators all over the world.

Founded in 1998, Connection Technology System Inc. (CTS) consists of a group of design, technical, and marketing professionals with diverse backgrounds in the communication field and focuses on the professional FTTX and Industrial networking solutions to telcos, network operators, and broadband service providers all over the world.

CTS Solutions product range includes 3 groups of products:

FTTX

  • Fiber Access Switch
  • Fiber CPE Switch
  • Fiber Gateway

Industrial Networking

  • Industrial Switch
  • Industrial Media Converter

Media Converters

  • Media Chassis
  • Media Converter
  • Industrial Media Converter
CNV-Logo_horizontal 200x69

Cubro is a leading manufacturer and global supplier of IT network visibility products that provide Network Monitoring, Security and Analytics Visibility Solutions for Service Providers and Enterprise Networks.

Cubro‘s product range includes:

As transformational technologies like 5G, SDN/NFV, SD-WAN, virtualization, and IoT are being adopted, networks have become increasingly complex with additional ‘blind-spots’.

Blind spots are network traffic that is not visible to network monitoring, security and analytics tools and can hide and obscure network performance and security threats. Today Service Providers and Enterprises must be able to see all of their data and applications in real time to secure and manage their growing networks and traffic demands while improving productivity and keeping watch for security attacks and leaks.

Cubro solutions provide enhanced visibility and control of all data transiting an organization’s network and are instrumental in the successful outcomes of IT initiatives including:

  • 5G/4G/3G Service Assurance and Customer Experience Management
  • Digital Transformation (Cloud)
  • Data Security
  • Next Generation Data Centers (Virtualization)
  • Software Defined Networking
  • High performance
GW_LOGO_NOIR_ROUGE_HD 1064x188

Gatewatcher is European leader in Intrusion Detection & Advanced Threat Detection. Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations.

Vulnerability management. From detection to analysis.

  • Trackwatch
    Identify in real time the most advanced threats and respond in case of a cybersecurity incident. Trackwatch® (qualified by ANSSI agency) is a turnkey solution, immediately up and running and easily configurable..
  • Aioniq
    Aioniq® is a new detection and response platform (NDR) that can confidently identify malicious actions and suspicious behavior through 360-degree modeling of the level of cyber risk by asset and user.
  • LastInfoSec
    LastInfoSec®, our Cyber Threat Intelligence (CTI) platform, responds to rapidly changing cyber threats, reduces false alarms, and increases the responsiveness and efficiency of cyber analysts through automated processes.
  • Aionbytes
    Aionbytes®, an advanced sandboxing solution, offers a hermetic and controlled environment that provides cyber analysts with a full report on the malicious capabilities of any potentially malicious file.
iQsol_Web_RGB

Log Management, Alerting and Disaster Recovery are going hand in hand to ensure your all around Data Center Security.
AMS – Alert Messaging Server – With Alert Messaging Server no alert stays undetected! Never miss out on incidents happening in your IT-Systems. AMS provides you with the entire overview.
LOGAPP – Regulation-compliant logging and SIEM – You want to collect, analyze and manage events of assets such as servers or network devices easily? LogApp can do all of that and even more!
POWERAPP – UPS-Power-Management – Your Energy Guard. Business Continuity Management (BCM) at highest standards: With PowerApp it is ensured that your IT-Assets, Machines and Data stay unharmed even during a longer lasting power blackout.
HAS – Hardware Security Appliance – Fast and simple HSM configuration up to 16 PKI server. This appliance simplifies the central creation and storage of certificates with YubiHSM.

PRIMX Logo 2

Data Encryption solution for advanced protection of sensitive data against loss, theft, disclosure, and economic espionage. Adding additional user right to understand the data.
ZONECENTRAL – Encryption for Files and Folders (NAS, SAN, File Servers)
ZED! – Encryption for Files in Transit (USB, Attachment, HD)
ZEDMAIL – Encryption for Emails (Outlook Plug-in)
ORIZON – Encryption for Cloud Storages (OneDrive, DropBox…)
ZONEPOINT – Encryption for Microsoft SharePoint Libraries
CRYHOD – Full Disc Encryption for Discs and Laptops

retarus-logo

SECURE EMAIL PLATFORM – The complete solution for business Email Security.
EMAIL SECURITY – Premium protection against cyber-attacks.

4-engine AntiVirus MultiScan Patient Zero Detection External Sender Visibility Enhancement
Anti-phishing Anti-Spam Sandboxing
Time-of-Click Protection Attachment Blocker Deferred Delivery Scan
Directory Filter Large Email Handling CxO Fraud Detection
Forensic SIEM integration Email Live Search Monitoring & Reporting…

TRANSACTIONAL EMAILS – Send high volumes of emails directly from your business applications. Newsletters, order confirmations, password resets and status notifications. Achieve a better delivery rate for your transactional emails.
EMAIL ARCHIVE – Store emails in a legally compliant manner.
EMAIL CONTINUITY – Keep emailing even when your email infrastructure isn’t available at the moment.
PREDELIVERY LOGIC – Rule-based email workflows. Analyze and process emails according to content, origin, and other criteria—even before they reach your infrastructure.

Virtuozzo_logo

Virtuozzo software and services enable any company to build, operate or sell their own private, public or hybrid cloud.

Virtuozzo cloud solutions offer a more affordable and easier-to-use alternative to hyperscale public cloud, or legacy enterprise cloud platforms. With a hyperconverged architecture and broad hardware support, they offer a fast, flexible way to enable:

  • Infrastructure as a Service
  • Platform as a Service
  • Multi-cloud application hosting
  • Kubernetes hosting
  • Cloud database management
  • High-performance
  • S3-compatible storage
  • and more…

Virtuozzo has more than 24 years’ experience in virtualization, 680+ service provider customers, and powers cloud for CSPs, MSPs, SMEs, ISVs and enterprises across the world. 

LOGO_WALLIX_2024_black+orange

Complete solution for protection and management of privileged and regular user access to IT assets and applications.
PAM – Privileged Access Management – Privileged Admin Session Capture, Password Management, Access Management, Application-To-Application Management
IAM – Identity & Access Management – IDaaS, SSO, Context-based Access Control, MFA, Corporate Identity Directories Synchronization, Identity Management solutions for provisioning user accounts and applications.
EPM – Endpoint Privilege Management – Eliminate local Admin rights and stop ransomware.
MFA – Multi Factor Authentication – Strong authentication to verify user identities.

whalebone_logo_green 400x129

WHALEBONE is European leader who provides best-in-class DNS Security solutions. Their products are cloud-based services that uses machine learning and other techniques to protect against malicious domain names and other cyber threats. It can help to prevent phishing attacks, malware infections, and other types of cybercrime by blocking access to known malicious websites and blocking communication with command-and-control servers. Whalebone DNS Security solutions can protect all the connected devices, including the IoT and other devices that are otherwise difficult or impossible to protect. On top of that, all of this happens in the simplest possible way, so that everyone gets a chance to be seamlessly protected.

  • Aura (for nationwide Telco operators)
  • Immunity (for enterprises and public institutions)
    Network-level DNS security – protects all connected devices without the need to install anything.
    – Designed for smooth deployment – we can make it work in 4 hours.
    – Allows you to have more control over the security of employees who work remotely.
    – Gives you a live audit and full visibility of the DNS traffic that traditionally flew under the radar. Get an overview from the bird’s eye view as well as precise microscope insight into particular queries.
    – Immunity allows you to get an overview and control of your DNS traffic while making it safe.
    – The combination of on-premises and cloud components makes it easy to fit into existing environments.
    – Whalebone Content Filtering allows you to simply set boundaries.
    – No up-front commitments. Start a free trial with us and see how you feel about it.
  • Peacemaker (for regional internet providers)