Network and Security

Network and Security

Network and Security

Home Product & Services Network & Security

Network & Security



There are two extremes: absolute security and absolute access. The closest we can get to an absolutely secure machine is one unplugged from the network, power supply, locked in a safe, and thrown at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state. We constantly make decisions about what risks we're willing to accept. When we get in a car and drive to work, there's a certain risk that we're taking. When we get on an airplane, we're accepting the level of risk involved as the price of convenience. Yes, it would be more convenient, but the risk of injury outweighs the advantage of convenience.

Every organization needs to decide for itself where between the two extremes of total security and total access they need to be. A policy needs to articulate this, and then define how that will.

The offered infrastructures are as follows:


Anti Spam Alliances



Anti Spam Alliances

Anti-spam appliances are hardware devices integrated with on-board software that implement anti-spam techniques (e-mail) and/or anti-spam for instant messaging and are deployed at the gateway or in front of the mail server.

Get the only mail server security solution that blocks emails containing links to malicious sites—the most common tactic cybercriminals use today. ScanMail Suite for Microsoft Exchange delivers leading signature-based content security plus innovative email and web reputation technologies—powered by the Trend Micro™ Smart Protection Network™—to protect your data from theft and accidental loss. Optimized for the latest Exchange platforms, it minimizes administration and server impact. According to a 2010 comparison study by Osterman Research, ScanMail's total cost of ownership is 50 percent less than competitive solutions.

ScanMail™ Suite for Microsoft™ Exchange

High Security. Low Administration.All in Real Time.

Get the only mail server security solution that blocks emails containing links to malicious sites—the most common tactic cybercriminals use today. ScanMail Suite for Microsoft Exchange delivers leading signature-based content security plus innovative email and web reputation technologies—powered by the Trend Micro™ Smart Protection Network™—to protect your data from theft and accidental loss. Optimized for the latest Exchange platforms, it minimizes administration and server impact. According to a 2010 comparison study by Osterman Research, ScanMail's total cost of ownership is 50 percent less than competitive solutions.


More Information

SMS
Gateway


sms-gateway

Ozeki NG SMS Gateway for corporate users

This is an excellent software for those who want to create SMS services in their corporate IT system!

Ozeki NG - SMS Gateway is the best software product for sending SMS notifications and for building automated SMS information retrieval services. It can be installed on Windows and on Linux systems and it can be used to send and receive SMS and MMS messages. It provides various interfaces. Check out some of the most popular ones:

If you want to use mobile messaging in your company, the best practice is to setup an SMS gateway on one of your servers to handle all your mobile messaging needs. This SMS gateway can be connected to the mobile network through a wireless link, by using a GSM modem or through the Internet (Figure 1). It will provide a central point of access for your office users and your IT system when they want to use mobile messaging. This way you can avoid the chaos independent SMS service subscriptions can cause over time.


More Information

Switch


switch

EX Series Ethernet Switches address the access, aggregation, and core layer switching requirements of micro branch, branch office, campus and data center environments, providing a foundation for the fast, secure and reliable delivery of applications that support strategic business processes. EX Series enterprise Ethernet switches deliver operational efficiency, business continuity, and agility, enabling customers to invest in innovative initiatives that increase revenue and help them gain a competitive advantage.

In an enterprise campus and branch application, the EX Series Ethernet switches—as part of Juniper's Simply Connected portfolio—work with Juniper wireless and security solutions to create a standards-based network foundation that is well-aligned and flexible enough to deliver all enterprise applications—everything from file services to IP telephony, messaging, presence, video conferencing, and Web services.




More Information

Router


router

Comprehensive, scalable, and secure routing solutions specifically designed to meet the needs of both enterprises and service providers. All of our routers - core, multiservice edge, and carrier Ethernet - run on one common operating system.

Router Variants :

More Information

Firewall


SRX Series Next-Generation Anti-Threat Firewall

High-performance security with advanced, integrated threat intelligence, delivered on the industry's most scalable and resilient platform. SRX Series gateways set new benchmarks with 100GbE interfaces and feature Express Path technology, which enables up to 2 Tbps performance for the data center.

JUNIPER SRX SERIES SERVICES GATEWAYS FOR THE BRANCH

JUNIPER SRX SERIES SERVICES GATEWAYS FOR THE DATA CENTER


More Information

SANGFOR Integrated NGFW + WAF SERIES


Sangfor NGAF

By virtue of technology optimization, SANGFOR NGAF managed to deliver professional NGFW and WAF security all-in-one box without scarifying the performance. With the kernel-level correlation of security modules for highly integrated layer2-layer7 visibility, SANGFOR NGAF provides an enhanced security solution suite not only to the network hosts, but also to the servers and business applications with high security effectiveness.


Holistic, Self-Adaptive Protection

Sangfor developed a holistic approach based on 4 key principles: Prediction, Defense, Remediation and Backtracking. You can now Predict the attacks & threats before they even happen, Defend your Network and if any suspicious is detected, it will be Remediated. With the Backtracking capabilities, you can analyze the reports to timely and efficiently set up network security policies.

Best Value for Benefits

Sangfor NGAF offers a better Value for your Money by making sure that it is the Best Suited Security Solution, in order to provide a Safe, Secure and Managed network environment with a much lower TCO compared to other solution available in the industry

More Information

Bandwidth Management

img-bandwidth-control
bandwidth-management


Most corporate environments today have hundreds of applications running on the network at any given time. They all have different management issues, depending on the application type, and there is no one-size-fits-all technique to optimize performance across the board. In addition, recreational and peer-to-peer (P2P) traffic can consume essential bandwidth needed to power business applications. Do you know much WAN bandwidth is consumed by recreational traffic such as YouTube, Facebook and casual Web browsing? How can you prioritize bandwidth use to align network resources with business objectives?


To help you manage and optimize all your internal, external and real-time applications, We offers a variety of bandwidth management technologies, including:

  1. Layer 7 traffic classification and discovery to precisely identify traffic
  2. Traffic shaping to control bandwidth utilization by application
  3. Compression and caching technologies to reduce bandwidth utilization
  4. Video stream-splitting to reduce bandwidth utilization

By applying the right combination of these technologies, We helps you:
  1. Identify the types of applications on the network
  2. Determine the causes of slow application performance
  3. Prioritize business traffic when bandwidth is scarce
  4. Ensure top-quality application performance and a superior end-user experience across your enterprise

More Information

Content Control System (Web Filtering)


IAM

Internet has become a vital platform for most businesses as more and more mission-critical applications have been deployed over the Internet. However with great opportunities come great challenges.

IT departments are often neglected as they are only seen as a cost, rather than an investment. Improving user experience and work efficiency , blocking illegal endpoints, reducing bandwidth consumption, guarding intellectual property rights, protecting against malware and implementing internet access compliance have become the main challenges for IT managers . Moreover, with the rise of the BYOD (Bring Your Own Device) trend in work environment, superior enterprise Internet management tools are needed more urgently than ever for the overburdened IT department.

SANGFOR Internet Access Management (IAM) is the ideal solution designed to tackle enterprise network challenges which offer simple and reliable Internet access control.

With SANGFOR IAM, you can also transform your wireless network into a Marketing Tool, which can allow you to generate more revenue through advertisements and better understand your customer's behavior

At the same time, as information and data are becoming key assets, enterprises are paying more attention to prevent potential information leakage and disruptive network activities. SANGFOR IAM can realize refined content auditing for common IM programs (Instant Messenger such as Yahoo Messenger, Skype, Gtalk), emails and social network platforms (Facebook,Twitter, etc.).



Sangfor IAM

As the leading vendor in Asia and No. 1 brand in China for the Network Management market, Sangfor IAM has been already listed in the Gartner Magic Quadrant for 4 years in a row. It has professional behavior management, application control, traffic control, information control, illegal hotspot control, behavior analysis, wireless network management and many other features, which can truly achieve a Unified Internet Behavior Management of all clients in the entire network.

  1. Effectively prevents staff from doing non-work related activities.
  2. Maximize the bandwidth usage.
  3. Avoids leakage and regulatory risks, protect the intranet data security.
  4. Visual management and comprehensive control of wireless APs.

Mainly used as an Internet Behavior Management device deployed in the Internet gateway, it can support 10 Gbps environment, provide Unified Wired and Wireless networks and can be used in many other scenarios to secure and maximize your network. Sangfor IAM has already served more than 20,000 customers in every kind of industry


Product Advantages Sangfor IAM


More Information

WAN
Optimizer


wano
wano

The Best Solution for Your Wide Area Network

Sangfor WANO (WAN Optimization) can be deployed in the WAN gateway of data centers and branch offices. Through traffic reduction, stream compression, stream cache, protocol acceleration and other leading technologies, Sangfor WANO can cut up to 70% of redundant traffic, reduce packet loss rate to below 1%, save 50 % of link costs and improve application speed by 3-10 times to achieve huge improvement for application performance & WAN speed.

Virtual WAN Optimization Solution

Sangfor WAN Optimization Solution, including Hardware and Virtual Software Products, support the Internet, Internal WANs, Public and Private Clouds and Hybrid Networks.

Sangfor Virtual WAN Optimization Software, which support & run on major hypervisors, can be quickly & easily deployed within virtual infrastructures, offering the full suite of WAN optimization features. Unlock the potential of virtualized environments with Sangfor's virtual WAN optimization software that delivers the cost and flexibility benefits of virtualization built.

Virtual WANO AWS solution

Sangfor vWOC accelerate the data transfer between the Cloud and Data Center, Branch Office or End Users. It eliminates the negative effect from limited bandwidth, packet loss and latency & easily enhances your application experience in AWS.


Product Advantages

More Information

Wireless


wireless

About Wireless

Prior to wireless networks, setting up a computer network in a business, home or school often required running many cables through walls and ceilings in order to deliver network access to all of the network-enabled devices in the building. With the creation of the Wireless Access Point, network users are now able to add devices that access the network with few or no cables. Today's WAPs are built to support a standard for sending and receiving data using radio frequencies rather than cabling. Those standards, and the frequencies they use are defined by the IEEE. Most WAPs use IEEE 802.11 standards.

A typical corporate use involves attaching several WAPs to a wired network and then providing wireless access to the office LAN. The wireless access points are managed by a WLAN Controller which handles automatic adjustments to RF power, channels, authentication, and security. Further, controllers can be combined to form a wireless mobility group to allow inter-controller roaming. The controllers can be part of a mobility domain to allow clients access throughout large or regional office locations. This saves the clients time and administrators overhead because it can automatically re-associate or re-authenticate.


More Information

Network Analyzer

network-analyzer
network-analyzer

A Packet Sniffer (also known as a network sniffer, network analyzer or protocol analyzer or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network.

Monitoring Networks with PRTG Network Monitor

PRTG Network Monitor is a powerful network monitoring application for Windows-based systems. It is suitable for small, medium, and large networks and capable of LAN, WAN, WLAN, and VPN monitoring. You can also monitor physical or virtual web, mail, and file servers, Linux systems, Windows clients, routers, and many more. PRTG monitors network availability and bandwidth usage, as well as various other network parameters such as quality of service, memory load, and CPU usages, even on remote machines. It provides system administrators with live readings and periodical usage trends to optimize the efficiency, layout, and setup of leased lines, routers, firewalls, servers, and other network components.

The software is easy to set up and use and monitors a network using Simple Network Management Protocol (SNMP), Windows Management Instrumentation (WMI), packet sniffer, Cisco NetFlow (as well as IPFIX, sFlow, and jFlow), and many other industry standard protocols.

It runs on a Windows-based machine in your network for 24-hours every day. PRTG Network Monitor constantly records the network usage parameters and the availability of network systems. The recorded data is stored in an internal database for later analysis.

PRTG Network Monitor follows and analyses your network and requires no third party software. It's quick to download and install. PRTG will be up and running in a just a few minutes including a first auto-configuration. Smart Setup, the built in interactive guidance dialog, will lead you through the whole process.

What is PRTG for?

  1. Monitoring and alerting you to up-/downtimes or slow servers,
  2. System health monitoring of your various hardware devices,
  3. Network device monitoring, bandwidth accounting,
  4. Applications monitoring,
  5. Monitor virtual servers,
  6. Service Level Agreement (SLA) monitoring,
  7. System usage monitoring (for example, CPU loads, free memory, free disk space),
  8. Database performance as well as main parameter monitoring,
  9. Email server monitoring and reviewing various backup solutions,
  10. Monitoring the network's physical environment,
  11. Classifying network traffic by source/destination as well as content,
  12. Discovering unusual, suspicious, or malicious activity with devices or user,
  13. Measuring Quality of Service (QoS) and Voice over IP (VoIP) parameters,
  14. Cloud monitoring services,
  15. Discovering and evaluating network devices,
  16. Collecting system information for various hardware,
  17. Finding unexpected relationships between your network components to detect potential
  18. security issues and assessing the real usage of your network and hardware,
  19. Monitoring a fail-safe using a failover cluster setup.

More Information

Cabling
System


cabling

Enterprise Cable & Connectivity

Our cable and connectivity products deliver the signal transmission solutions that provide the advanced performance and reliability needed to support mission-critical information systems, advanced communications networks, premise security systems and building automation and control systems.

From the data center and LAN to building management, A/V applications and security and alarm systems, We provide effective, reliable performance while supporting the complex and unique requirements of users, devices, servers and processors in both local and remote Enterprise topologies.

More Information
Data Center
system hardware
network
virtualization
multimedia
Communication

Want to buy in our e-commerece?

BUY!