Product categories
- Application Security
- Cloud Security
- Cyber Security Services
- Data Masking
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Secure File Transfer
- Security Information and Event Management
- Transport Access Control
- User Security
- Vulnerability Assessment
-
Block Armour Secure Shield
$9,500.00 for 1 yearBlock Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware.Block Armour Secure Shield
Category: Cloud Security Data-in-Motion Encryption and VPN Network Access Control Transport Access Control User Authentication Zero trust | SKU: BA-SS-ULBlock Armour Secure Shield is a Unified Secure Network Access Solution built on Zero Trust powered by SDP and Block Chain that protects Enterprise, Cloud and IOT Network Access scenarios for employees, third-party users and IOT devices and sensors as well. It can be used to ensure a secure WFH/BYOD experience and reduces the attack surface for malware and ransomware. -
Impero Connect
$12.00 – $35.00 / yearImpero Connect (Formerly Netop Remote Access)- Remote Access for Retail, POS
- Remote Support and Secure Access for ATMs and Banks
- Remote Access for Production Technology
- Remote Control for BPO
- Remote Support for large organizations
- 256-bit AES encryption
- Centralized multi-factor authentication
- Multi-factor authentication through Microsoft Azure, RADIUS, RSA SecurID and Smartcards
- MAC or IP list-enabled machine access
- Complete logging with customizable audit trails and session recordings
- Exceeds PCI, GDPR, ISO & HIPAA compliance requirements for authentication & encryption
- Integration with Directory Services
- Access parameters for specific end users or devices
- Granular control over all user permissions through individual or group definitions
- Closed User Group license keys
- Customizable security roles
- Automatic locking or logging of remote machines in case of abnormal disconnection
- Restrict user access with application white-listing
Impero Connect
Impero Connect (Formerly Netop Remote Access)- Remote Access for Retail, POS
- Remote Support and Secure Access for ATMs and Banks
- Remote Access for Production Technology
- Remote Control for BPO
- Remote Support for large organizations
- 256-bit AES encryption
- Centralized multi-factor authentication
- Multi-factor authentication through Microsoft Azure, RADIUS, RSA SecurID and Smartcards
- MAC or IP list-enabled machine access
- Complete logging with customizable audit trails and session recordings
- Exceeds PCI, GDPR, ISO & HIPAA compliance requirements for authentication & encryption
- Integration with Directory Services
- Access parameters for specific end users or devices
- Granular control over all user permissions through individual or group definitions
- Closed User Group license keys
- Customizable security roles
- Automatic locking or logging of remote machines in case of abnormal disconnection
- Restrict user access with application white-listing
-
Network Configuration & Firewall Rules Review
$100.00Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy.Network Configuration & Firewall Rules Review
Category: Network Access Control Network Behavior Analysis and Anomaly Detection Network Firewall (includes Next Generation Firewalls) Network Monitoring and Forensics |Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy.