Due to global supply chain issues, please call 503-208-8410 or email us to verify inventory.

Network & Communication

Items 1 to 6 of 229 total

Set Ascending Direction
per page

Grid  List 

Page:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  • Click for price

  • Aruba IntroSpect 2000 Network Security/Firewall Appliance - 1 Year

    USER AND ENTITY BEHAVIOR ANALYTICS

    Aruba's User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning (ML), pinpoint visualizations and instant forensic insight into a single solution, so attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization.

    With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavior-based attack detection and forensically-rich incident investigation and response at enterprise scale.

    WHAT WE DETECT: SECURITY ANALYTICS USE CASES

    IntroSpect provides 100+ supervised and unsupervised machine learning models focused on detecting targeted attacks at each stage of the kill chain:

    • Account Abuse
    • Account Takeover
    • Command and Control
    • Data Exfiltration
    • Lateral Movement
    • Password Sharing
    • Privilege Escalation
    • Flight Risk
    • Phishing
    • Ransomware
    ACCELERATED INVESTIGATION & RESPONSE

    From SysAdmins to Systems to Sensors - Providing Instant Visibility

    IntroSpect Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides a comprehensive security profile with continuous risk scoring and enriched security information - analysts would otherwise spend hours or days searching for and compiling months and years of security data down to the packet level. Entity360 provides:
    • Profiles for users, systems and devices
    • Access by SIEM, NAC systems, etc. via an open API
    • Pre-packaged incident response playbooks
    • Customer-measured 30 hours/investigation savings
    • Automatic detection of other entities impacted by the attack
    THREAT HUNTING

    Proactive threat hunting is easily accomplished with a powerful query interface, without the overhead of finding, searching, and summarizing isolated data stores.
    • Rich analytics to test threat hypotheses across any timeframe
    • Automated search of historical data using IOC's from STIX and custom threat feeds
    • Visualizations to highlight anomalies and significant interactions
    • Significant activity monitored and tagged to assist with both hunting and investigations
    DATA SOURCES

    The IntroSpect platform processes the broadest range of data sources, including:
    • VPN, FW, IPS/IDS, Web proxy, Email logs
    • NetFlow
    • Packets
    • DNS logs
    • Active Directory logs
    • DHCP logs
    • External threat feeds
    • Alerts from 3rd party security infrastructure
    DEPLOYMENT OPTIONS
    • On-premise VM or appliance for Packet Processor
    • AWS or on-premise deployment for Analyzer

    KEY INTEGRATIONS

    • ArcSight
    • Aruba ClearPass
    • Blue Coat
    • Checkpoint
    • Cisco
    • FireEye
    • Forcepoint
    • Fortinet
    • Gigamon
    • IBM QRadar
    • Infoblox
    • IXIA
    • Juniper
    • McAfee (as in proxy server)
    • Microsoft
    • Palo Alto Networks
    • Splunk

    Learn More
    Click for price

  • Aruba IntroSpect 2500 Network Security/Firewall Appliance - 1 Year

    USER AND ENTITY BEHAVIOR ANALYTICS

    Aruba's User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning (ML), pinpoint visualizations and instant forensic insight into a single solution, so attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization.

    With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavior-based attack detection and forensically-rich incident investigation and response at enterprise scale.

    WHAT WE DETECT: SECURITY ANALYTICS USE CASES

    IntroSpect provides 100+ supervised and unsupervised machine learning models focused on detecting targeted attacks at each stage of the kill chain:

    • Account Abuse
    • Account Takeover
    • Command and Control
    • Data Exfiltration
    • Lateral Movement
    • Password Sharing
    • Privilege Escalation
    • Flight Risk
    • Phishing
    • Ransomware
    ACCELERATED INVESTIGATION & RESPONSE

    From SysAdmins to Systems to Sensors - Providing Instant Visibility

    IntroSpect Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides a comprehensive security profile with continuous risk scoring and enriched security information - analysts would otherwise spend hours or days searching for and compiling months and years of security data down to the packet level. Entity360 provides:
    • Profiles for users, systems and devices
    • Access by SIEM, NAC systems, etc. via an open API
    • Pre-packaged incident response playbooks
    • Customer-measured 30 hours/investigation savings
    • Automatic detection of other entities impacted by the attack
    THREAT HUNTING

    Proactive threat hunting is easily accomplished with a powerful query interface, without the overhead of finding, searching, and summarizing isolated data stores.
    • Rich analytics to test threat hypotheses across any timeframe
    • Automated search of historical data using IOC's from STIX and custom threat feeds
    • Visualizations to highlight anomalies and significant interactions
    • Significant activity monitored and tagged to assist with both hunting and investigations
    DATA SOURCES

    The IntroSpect platform processes the broadest range of data sources, including:
    • VPN, FW, IPS/IDS, Web proxy, Email logs
    • NetFlow
    • Packets
    • DNS logs
    • Active Directory logs
    • DHCP logs
    • External threat feeds
    • Alerts from 3rd party security infrastructure
    DEPLOYMENT OPTIONS
    • On-premise VM or appliance for Packet Processor
    • AWS or on-premise deployment for Analyzer

    KEY INTEGRATIONS

    • ArcSight
    • Aruba ClearPass
    • Blue Coat
    • Checkpoint
    • Cisco
    • FireEye
    • Forcepoint
    • Fortinet
    • Gigamon
    • IBM QRadar
    • Infoblox
    • IXIA
    • Juniper
    • McAfee (as in proxy server)
    • Microsoft
    • Palo Alto Networks
    • Splunk

    Learn More
    Click for price

  • Check Point QSFP28 Module - For Data Networking, Optical Network - 1 x 100GBase-X Network - Optical Fiber - Multi-mode - 100 Gigabit Ethernet - 100GBase-X - Plug-in Module

    Check Point QSFP28 Module - For Data Networking, Optical Network - 1 x 100GBase-X Network - Optical Fiber - Multi-mode - 100 Gigabit Ethernet - 100GBase-X - Plug-in Module Learn More
    $221,021.28

  • Check Point DDoS Protector - 10GBase-X - 40 Gigabit Ethernet - 24 Total Expansion Slots - Rack-mountable

    Check Point DDoS Protector™ Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance. Modern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company's security perimeters to block destructive DDoS attacks before they cause damage.

    Learn More
    $292,786.50

  • Check Point DDoS Protector - 10GBase-X - 40 Gigabit Ethernet - 24 Total Expansion Slots - Rack-mountable

    Check Point DDoS Protector™ Appliances block Denial of Service attacks within seconds with multi-layered protection and up to 40 Gbps of performance. Modern DDoS attacks use new techniques to exploit areas where traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. DDoS Protectors extend company's security perimeters to block destructive DDoS attacks before they cause damage.

    Learn More
    $281,523.68

Items 1 to 6 of 229 total

Set Ascending Direction
per page

Grid  List 

Page:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5