Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to control access to an organization's IT infrastructure. - Unify endpoint security systems with user authentication tools - Enact complex policies to restrict network access to authorized users - Centralize access control systems
49 results
Reduce IT's security burden with AvePoint Insights for Microsoft 365. Easily find, prioritize, and fix controls for permissions, membership, and sharing. Insights makes it easy to monitor Office 365 permissions with tenant-wide security reports across your Microsoft cloud services. But how do you know if there’s an issue? Insights aggregates sensitivity and activity data across your tenant, so your critical permissions issues are prioritized for action. Then, edit in bulk from actionable reports. Securing collaboration in Teams, Groups, Sites, and OneDrive has never been easier.
Sangfor Internet Access Gateway (IAG) is a superior, robust, and affordable Secure Web Gateway (SWG) option with superior local support and experience, perfect for enterprises. Its key product features include proxy avoidance protection, intelligent traffic management, precise and accurate application control, unified network management, gateway, and client decryption, interoperability with ICAP-enabled servers, and streamlined control. Sangfor IAG offers benefits including comprehensive auditing with a baseline of trust with endpoints fully secured, real-time monitoring capabilities across all communication channels, precision control with tailor-made security policies for various departments' and enterprises' needs, and dynamic monitoring to identify potential leaks and suspicious activities.
Revolutionize the way you secure data, resources, and users in your network with Perimeter 81’s Secure Access Software Edge. Our growing SASE platform combines network and security functionality into one scalable, cost-efficient, and cloud-based service. SASE’s cloud architecture model includes services such as ZTNA, FWaaS, SWG, and CASB, all in one platform. This convergence allows companies of all sizes to secure business productivity with a holistic software service dedicated to solving all their network security needs.
Access Control System With the increase in usage and storage of classified data and information by almost all organizations, it has become inevitable to think about the security of those data and information. The stakes here are very high for the companies and there is no let-off as far as their security and safety are concerned. That is the reason we find access control mechanisms installed in office premises, hospitals, government buildings, and related infrastructure. Access control means allowing the authority to only a set number of individuals at a designated area. This ensures that the data and information are kept safe and secure.
Access Control as a Service. No plugins. Arcules Cloud enabled. Built to "just work". UNIFIED EXPERIENCE Integrated access control with video surveillance in one interface, for a complete security experience. CONTROL DOOR ACCESS Arcules enables faster setup than traditional security systems. Quickly and easily configure users, access levels, schedules and holidays. VIDEO VERIFICATION Correlate access control events, like badge scans with recorded video footage. Seeing is believing. Easy to use Intuitive, browser-based installation and workflow makes it easy to configure everything in your system; from doors to users to access levels. Flexible scheduling Leave the IT team alone. It’s simple to set up global schedules, access levels and holidays from a single interface without the need for IT support. With a simple click, you can add and manage cardholders.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Our cutting-edge Network Threat Analytics solution, NetTAC, is purpose-built to empower your SOC team and enhance their visibility by providing them with Enterprise-wide situational awareness to identify attacks as well as breaches as they occur. With advanced analytical techniques, incident triage, and the ability to retrospectively identify threats as new Tactics, Techniques, and Procedures (TTPs), NetTAC leverages Deep File Inspection® (DFI) to analyze content beyond the application layer and ensure your assets remain protected even against the most sophisticated of threats targeting your Enterprise. CORE COMPETENCIES ▪ Breach Detection ▪ Threat Analytics ▪ Automated Theat Hunting via RetroHunt® ▪ Data Loss Prevention ▪ Actionable and Automated Threat Intelligence FEATURES & BENEFITS ▪ Network and File Analysis at Scale ▪ IOC Extraction and Analysis ▪ Cloud-assisted Threat Protection ▪ Force Multiply Your SOC
ElevenOS software works with the leading network infrastructure to simplify the process of authenticating guests and managing Wi-Fi performance across the enterprise. Eleven has been the leader in guest Wi-Fi management for over 20 years. Top brands trust us to keep millions of guests connected every month. Featuring WPA2 encrypted connections via the Wi-Fi certified Passpoint® standard, security is of utmost importance at Eleven. ElevenOS global cloud infrastructure has built-in language and currency translations. With high reliability and 24/7 support, ElevenOS enables providers and brands to deliver Wi-Fi that just works.
Empower your workforce with our industry leading networking products and solutions portfolio, designed to give your end users reliable and secure access to your business applications and to enable your digital transformation initiatives. Whether you are looking for fast and reliable wired connectivity from edge to core or wireless access infrastructure, Pylones can design and build the optimal network for your specific needs ensuring that it is robust, cost efficient and easy to manage.