1 May 2018
Comments: 0

Altaro Hyper-V Backup

Hyper-V Backup in 5 clicks – Hyper Easy, Hyper Fast, Hyper Effective A powerful Hyper-V aware backup solution that easily backs up Microsoft Hyper-V Virtual Machines. Take the guesswork out of backing up Hyper-V, you won’t find an easier to use or quicker to configure solution. Fully Hyper-V Aware Does all the complex config connections […]

30 April 2018
Comments: 0

Ruckus Wireless Access Point and Controller

Product ID Product Description Quantity 901-5100-WW10 ZD 5100 WW manages up to 100APs AC 1 901-7372-WW00 11n Indoor AP 2×2.2 Dual Band 2-Port 7 901-H500-WW00 H500 WW dual band 11ac wall switch AP 437 901-H510-WW00 H510 WW dual band 11ac wall switch AP 246 901-P300-WW01 P300 WW 11ac outdoor bridgr – single 4 901-R510-WW00 R510 […]

29 April 2018
Comments: 0

Spamina – Flexible and Secure Digital Communications

Cloud Email Firewall with ATP Cloud Email Encryption Cloud Email Archiving Antispam, Protection against phishing, malware, spoofing and viruses Email Archiving – unlimited storage up to 10 years. APT module executes the links(URLs) & attachments before it comes into your inbox thus blocking all attacks (including Ransomware) that comes through email links/attachments. Our IT Security […]

26 April 2018
Comments: 0

File Audit – Windows File System Auditing

Track, audit, report and alert on all access to files and folders on Windows Servers. Monitor & record file read/write/delete accesses (or access attempts), ownership changes, and permission modifications in real time. Significantly reduce the workload related to monitoring access to sensitive files and folders Call for more information: +971-55-7860987

25 April 2018
Comments: 0

User Lock – User Access Security for Active Directory users

UserLock secures access to Windows networks by restricting simultaneous sessions, by limiting user access to the network and by providing administrators with remote session control, alert options and advanced reporting for session analysis. Simultaneous session prevention/restriction for AD users Workstation(s) restriction for AD users Time restriction for AD users Connectivity surveillance and monitoring Call for […]

24 April 2018
Comments: 0

InDefend Business in-Cloud – Data Resolve

Data Leakage Prevention Insider Threat Management Solution Browser Monitoring Employee Behavior Monitoring Employee Productivity Monitoring Application monitoring Application Whitelisting Acts as a gatekeeper and monitor every instance & traffic going out from end-point accessing channels: FTP, Web, Proxies, External Devices, Remote access sessions, Print, Clipboard, Emails, Mobile Devices. Helps organization to profile employee based on […]