22
P.O.Box 500182, Dubai, U.A.E BB2, Floor No 29, Mazaya Business Avenue, Jumeirah Lakes Towers, Dubai U.A.E [T] +971 4 457 6500 [F] +971 4 457 6599 [E] [email protected] / [email protected] www.comguard.net Coporate Office: Overseas Offices: SAUDI ARABIA Al Mosa Building, Showroom No.2, Next to Air Arabiya and Mobily Office South of Kingdom Centre, Olaya Dist, Riyadh, Kingdom of Saudi Arabia [M] +966 502792684 [T] +966 1 461 1997 [F] +966 1 461 1377 INDIA MBC Centre, Ground Floor, 143/A Ghodbunder Road Opp. Cine Wonder Mall, Kapur Bawdi, Thane, Mumbai, Maharashtra - India 400607 [T] +91 22 61934800 [F] +91 22 61934801 [E] [email protected]

Comguard E-Brochure

Embed Size (px)

DESCRIPTION

ComGuard FZ LLC was established in 2002 at Dubai Internet City. The company was taken over by Spectrum FZ in 2007. The change in management brought about strategic changes and soon helped the company re-emerge as one of the leading value added distributors of IT security products in the region.

Citation preview

Page 1: Comguard E-Brochure

P.O.Box 500182, Dubai, U.A.E BB2, Floor No 29, Mazaya Business Avenue, Jumeirah Lakes Towers, Dubai U.A.E

[T] +971 4 457 6500 [F] +971 4 457 6599 [E] [email protected] / [email protected]

www.comguard.net

Coporate Office:

Overseas Offices:

SAUDI ARABIAAl Mosa Building, Showroom No.2, Next to Air Arabiya and Mobily OfficeSouth of Kingdom Centre, Olaya Dist, Riyadh, Kingdom of Saudi Arabia

[M] +966 502792684 [T] +966 1 461 1997 [F] +966 1 461 1377

INDIAMBC Centre, Ground Floor, 143/A Ghodbunder Road

Opp. Cine Wonder Mall, Kapur Bawdi, Thane, Mumbai, Maharashtra - India 400607[T] +91 22 61934800 [F] +91 22 61934801 [E] [email protected]

Page 2: Comguard E-Brochure

SPECTRUM GROUP pg 01

COMGUARD OVERVIEW pg 02

PRODUCT OVERVIEW - KASPERSKY pg 03

PRODUCT OVERVIEW - WATCHGUARD pg 05

PRODUCT OVERVIEW - GFI pg 07

PRODUCT OVERVIEW - GATEPROTECT pg 09

PRODUCT OVERVIEW - SAFENET pg 11

PRODUCT OVERVIEW - TRIPWIRE pg 13

PRODUCT OVERVIEW - NETSWEEPER pg 15

PRODUCT OVERVIEW - CLAVISTER pg 17

PRODUCT OVERVIEW - BEYONDTRUST pg 19

PRODUCT OVERVIEW - HP | DAMBALA pg 21

PRODUCT OVERVIEW - WILDPACKETS | ENTUITY pg 23

PRODUCT OVERVIEW - COURION | IXIA pg 25

PRODUCT OVERVIEW - BLUECAT | DELPHIX | WINMAGIC pg 27

PRODUCT OVERVIEW - ARRAY NETWORKS | ACUNETIX | AIRTIGHT | PING IDENTITY pg 29

PRODUCT OVERVIEW - NSFOCUS | FIXMESTICK | EC-COUNCIL pg 31

WIRELESS PRODUCT OVERVIEW pg 33

WIRELESS PRODUCT OVERVIEW - CAMBIUM | ENGENIUS pg 34

WIRELESS PRODUCT OVERVIEW - ALTAI | MERU NETWORKS | AIRLIVE | 4IPNET pg 35

COMGUARD INITIATIVES, CUSTOMERS LIST pg 37

COMGUARD SUPPORT, SERVICES and STRATEGY pg 38

COMGUARD INDUSTRY RECOGNITION | PARTNER APPRECIATION pg 39

CONTENTS

Page 3: Comguard E-Brochure

Spectrum Group was incorporated in the year 2004 in Dubai Internet City, since then Spectrum has emerged to be a pioneer in empowering organizations through its knowledge transfer services, professional services, consultancy services and as a value added distributor of IT Network and Security products and solutions, by leveraging on its inherent strength in infrastructure, excellent subject matter experts and excellent customer support capabilities. Today, Spectrum is most preferred by some of the world class networking, wireless, supply chain and IT security vendors. The excellence in professional services, supply chain management solutions and training services has gained Spectrum to be chosen by most prestigious organization such as Microsoft, Juniper Networks, Motorola, Infor, Kaspersky, GFI, EC-Council, HP Enterprise Security (ArcSight, Fortify and Tipping Point), Safenet, Array Networks, Bluecat, Airtight, WinMagic, Tripwire, nCircle, Ixia, Beyondtrust, Entuity, Wild Packets, Courion, NSfocus, Delphix, Damballa, Gateprotect, Clavister, WatchGuard, Acunetix etc. to represent their technical efforts in various nations.

Spectrum Group of companies has won many accolades such as “Spectrum Training won Excellence in Training Awards from Juniper Networks VAR Middle East chose Comguard FZ LLC as the Emerging Company of the year 2008, Best Overall Partner by Kaspersky Labs in 2008, and Comguard Networks recognised as Top 5 VAD’s in India by SME India 2012 etc.

Owing to its successful journey in in Middle East and Africa region, Spectrum Networks Solutions was launched in India in the year 2008, with intent to provide reach in Asia-Pacific Region. Spectrum Networks Solutions has created a niche in the training space and quickly gained industry recognition and high profile customers over the last few years. Spectrum is also renowned for its leading Professional services which aligns businesses and helps them to grow with their share of expertise in the area of System and Network infrastructure.

Integrated Solutions for Supply chain management is one of the major aspects of Spectrum, having a solid base of high profile customers. Spectrum Networks have paved its way in delivering services for Enterprises and has successfully emerged as a System Integrator for Supply Chain Management in the APAC Region. The system integration division caters end-to-end mobility solutions for effective operational growth of the enterprises by accelerating their productivity.

Spectrum Group is a synergy of Spectrum Training FZ LLC, Spectrum Networks Solutions (India). ComGuard FZ LLC and ComGuard Infosol (India) and Psilog International FZ LLC. Spectrum has taken quantum leaps in establishing itself as a one of the leading players in the Systems, IT Network Security and Supply Chain arena encompassing core technologies and tailoring them towards meeting discerning customer needs. Team Spectrum is all poised to extend uncompromising quality in delivering Technical Education, Consultancy and Infrastructure Services in Asia-Pacific region as it moves ahead.

The Spectrum Group

1 2

Page 4: Comguard E-Brochure

IT professionals remind us every day that their occupation is becoming increasingly difficult.The job has always been hard, but now the level of complexity across the network andconnected devices seems out of control. There is often frustration over the lack of resources, shrinking budgets, and users who take your policies to the limit. Once stationary, data has now migrated across multiple systems, smartphones and tablets and is often located in coffee shops, airplanes and left behind in taxis. And of course, application patching to stop vulnerabilities has become a full-time job (that is if you can ever really know which applications are being used). This complexity has forced some organizations to make security compromises.

You need a new, uncomplicated way to deal with these changes and threatsAdministrators can see, control and protect their IT environment with Kaspersky Endpoint Security for Business. Tools and technologies are uniquely balanced across progressive tiers to meet your evolving security and IT needs. Kaspersky can make your job easier.

Kaspersky boasts a comprehensive list of technologies — all working together from the same codebase and further assisted by the cloud-based Kaspersky Security Network — to give our customers the world-class protection they need.

In short, we’ve delivered the industry’s first Security Platform, built from the ground up, making it easy for you to see, control and protect your world.

The job has always been hard, but now the level of complexity across the network and connected devices seems out of control. There is often frustration over the lack of resources, shrinking budgets, and users who take your policies to the limit. Once stationary, data has now migrated across multiple systems, smartphones and tablets and is often located in coffee shops, airplanes and left behind in taxis. And of course, application patching to stop vulnerabilities has become a full-time job (that is if you can ever really know which applications are being used). This complexity has forced some organizations to make security compromises.

Administrators can see, control and protect their IT environment with Kaspersky Endpoint Security for Business. Tools and technologies are uniquely balanced across progressive tiers to meet your evolving security and IT needs. Kaspersky can make your job easier.

You need a new, uncomplicated waY to deal with these changes and threats.

Kaspersky boasts a comprehensive list of technologies — all working together from the same codebase and further assisted by the cloud-based Kaspersky Security Network — to give our customers the world-class protection they need.

In short, we’ve delivered the industry’s first Security Platform, built from the ground up, making it easy for you to see, control and protect your world.

Endpoint Management Infrastructure

About KASPERSKY ENDPoINt SECuRItY FoR buSINESSIT professionals remind us every day that their occupation is becoming increasingly difficult.

Tota

l

Sele

ct

Adva

nced

Core

Collaboration Mail Web

License Management Network Admission (NAC) Software Installation

Imaging/Provisioning Patch Management Vulnerability Scan

Application Control Device Control Web Control

Anti-Malware + Firewall

Data Protection (Encryption)

Mobile Endpoint Security Mobile Device Management (MDM)

File Server Security

Kasp

ersk

y Se

curit

y Ce

nter

WHICH TIER IS RIGHT FOR YOU?KASPERSKY ENDPOINT SECURITY FOR BUSINESS, COREStarting from a foundation of Kaspersky’s award-winning and powerful workstation anti-malware protection and a firewall, we add Kaspersky Security Center — our intuitive administration console. For customers who require anti-malware only, this is the solution.

KASPERSKY ENDPOINT SECURITY FOR BUSINESS, SELECTWorkstation & File Server Security, Application Whitelisting and Control, Device Control and Web Control form the protection roster of the Select tier. Also included is a mobile protection solution which consists of an endpoint security agent and Mobile Device Management (or MDM). If your needs include protecting a mobile workforce and enforcing IT policy, SELECT might be the right tier for you.

KASPERSKY ENDPOINT SECURITY FOR BUSINESS, ADVANCEDAt the ADVANCED tier, Kaspersky adds data protection in the form of file or full-disk encryption. Another new offering, Kaspersky Systems Management, combines security with IT efficiency. This broad set of features includes essential tools allowing the administrator to:• Create and store images and remotely deploy systems.• Prioritize the treatment of hardware and software vulnerabilities with a powerful combination ofadvanced Vulnerability Scanning and intelligent Patch Management.• Track license usage and compliance with Software License Management.• Set data and infrastructure access policies for users and guests with Network Admission Control (NAC).• Deploy and install updates and new software to users remotely from the central console.

KASPERSKY TOTAL SECURITY FOR BUSINESSOur flagship offering, Kaspersky Total Security for Business, combines all previous tiers and further enhances your security posture with additional Web, Mail and Collaboration Server protection. This is the perfect solution for organizations with broad security requirements who demand the best protection for each network level.

KASPERSKY ENDPOINT SECURITY FOR WINDOWS WORKSTATIONSBusiness changes are placing tremendous demands on IT. New technologies are being adopted by IT as a response to these pressures - but these trends pose critical and dangerous malware risks to the organization.Kaspersky enables customers to embrace new technologies and feel confident that they’re protected against the threats of tomorrow’s IT trends.As a cornerstone of Kaspersky’s solutions, Kaspersky Endpoint Security for Windows provides centralized protection of Windows workstations and Windows servers from malware, potentially dangerous programs and network attacks.

KASPERSKY ANTI-VIRUS FOR WINDOWS SERVERSModern corporate networks are complex systems that typically consist of terminal servers, server clusters and other types of nodes.Infrastructure like this demands the highest levels of protection, with file servers requiring dedicated software that won’t just protect data from the latest malware, but will also provide uninterrupted performance under the heaviest load conditions with minimal effect on network efficiency. Kaspersky Anti-Virus for Windows Servers has been developed specifically for networks like this, making it easy to protect your most valuable business resources today and in the future.In modern heterogeneous networks, a single virus can spread very quickly as it is virtually impossible to isolate a newly detected network infection immediately. Corporate users often place various files into file storages, thus exposing all nodes on the corporate network to risk, from workstations to shared file storage facilities.

3 4

ComGuard

Page 5: Comguard E-Brochure

Extensible Content Security (XCS) Appliances-- Email and Web Security with Data Loss PreventionWatchGuard XCS (Extensible Content Security) solutions, deliver the industry’s most effective defense- in-depth solution for email security, web security and data loss prevention. These easy-to-use, all-in-one solutions offer the most effective defense from email and web-based threats including spam, viruses, malware, URL filtering, blended threats, spyware and network attacks. Choose from six different models to suit the unique messaging security requirements ranging from small business to the most demanding enterprise email and web networks.

Stronger Security With Multi-Protocol ProtectionWatchGuard XCS appliances deliver unprecedented email security and web application security as well as control of traffic entering and exiting your email and web networks. Protect your network’s perimeter with a combination of defenses:

WatchGuard ReputationAuthority “in-the-cloud,” real-time monitoring service to block over 98% of unwanted traffic and threats with 99.9% accuracyAdvanced Anti-spam and Malware Prevention Engines for URL filtering on HTTP and HTTPSZero-Hour Threat Outbreak Response for the fastest response to new threatsAlways-On Email Security so you never lose a messageSet-It-And-Forget-It Administration with the ability to apply a single policy to control trafficGranular Reporting for visibility into security gaps and customizable reporting for audit requirements

WatchGuard XCS AppliancesFeatures:Encrypt Emails for Privacy and Compliance / Effectively Define Your Relationship with the Internet / Eliminate Spam and Email-borne Threats / Extend Protection to Web Traffic / Stop the Loss of Sensitive Data / Protection for Web Traffic / Enterprise-Grade Reliability / Centralized Management and Reporting / WatchGuard Quarantine Management Server (QMS) / Next-Generation Anti-Spam Technology / Protection from Email-Borne Threats / Data Loss Prevention (DLP) / Email Encryption with XCS Secure mail

The WatchGuard® SSL 100 & 560 are affordable, easy-to-use, secure remote access solutions providing reliable client and clientless connectivity to corporate data and resources, such as email, file shares and CRM. These all-in-one appliances offer the flexibility to provide basic access to networks with an auto-loading client, as well as more sophisticated access to web-based resources and non-native applications including SSH and RDP. The SSL 100 & 560 appliances offer advanced security features including integrated strong authentication and rich endpoint integrity checking. Desktop sharing features allow your helpdesk to fix a remote employee’s computer problems, so users stay productive from anywhere, anytime.

Security FeaturesStateful packet firewall, deep application inspection, application proxies: HTTP, HTTPS, SMTP, FTP, DNS, TCP, POP3Blocks spyware, DoS attacks, fragmented packets, malformed packets, blended threats and moreProtocol anomaly detection, behavior analysis, pattern matchingStatic and dynamic blocked sources listVoIP: H.323 and SIP, call setup and session security

Security Subscriptions Available in 1-year or 3-year subscriptions

Application ControlIntrusion Prevention Gateway AntiVirus WebBlockerspamBlockerReputation Enabled Defense

Buy an XTM Bundle and get your choice of appliance with a support and maintenance contract, plus all security subscriptions at a great price

Management SoftwareAll WatchGuard XTM appliances can be managed with the IT administrator’s choice of:

Command line interface with direct connects and scriptingWeb UI for single device management from anywhereWatchGuard System Manager (WSM): intuitive, centralized console providing interactive real-time monitoring and logging for network-wide system status at a glance. Includes drag-and-drop VPN creation and rich historical reporting

User AuthenticationTransparent Active Directory Authentication (single sign-on)XAUTH for RADIUS, LDAP, Secure LDAP, Windows Active DirectoryRSA SecurID® and VASCOWeb-based, local802.1X for XTM 2 Series wirelessMicrosoft Terminal Services and Citrix environments supported

Since 1996, WatchGuard® Technologies, Inc. has been the advanced technology leader of business security solutions, providing mission-critical protection to hundreds of thousands of businesses worldwide. WatchGuard family of wired and wireless unified threat management appliances, messaging, content security, access points and SSL VPN remote access solutions delivers enterprise-grade network protection for small to midsize businesses, keeping your network secure, employee productivity high, and turning the Internet from a security risk to a business empowerment tool. WatchGuard is headquartered in Seattle, Washington, with offices in North America, Latin America, Asia Pacific and Europe.

WatchGuard eXtensible Threat Management (XTM) - Next-Generation Network SecurityThe XTM family of next-generation network security appliances are best-in-class, performance-driven solutions. Blazing fast throughput combines with advanced networking features to handle high-volume traffic securely. The XTM Solutions Includes a suite of flexible management tools that allows IT administrators to manage security through an intuitive centralized console, command line interface, and web UI. There are multiple models to provide gateway security for businesses of all sizes, from mid-size to Enterprise levels

WatchGuard’s Next-Generation FirewallWatchGuard next generation firewall is an enterprise-class, high-performance gateway security appliance that provides top-of-the-line firewalling, intrusion prevention, and application control. WatchGuard’s NGFW products provide true line-speed security inspection on all traffic and support multi-gigabit packet filtering throughput. In addition, the NGFW connects offices via unique drag-and-drop VPN; connects people via SSL and IPsec VPN; and gives the enterprise unparalleled visibility into real-time and historical user, network, and security activities. WithWatchGuard’s NGFW, businesses can define, enforce, and audit strong security and acceptable use policies, resulting in increased employee productivity and less risk to critical intellectual property or customer data.

Key Next-Generation Firewall Characteristics:High performance security inspection that blocks attacks and unwanted traffic without hindering mission-critical Internet usage.Best secure throughput in its class, with a very broad feature set and the best real-time visibility tools.Supports over 1,800 applications, more than any other Next-Generation Firewall.Standard Firewall Capabilities: Packet Filtering, Network Address Translation(NAT), Stateful Protocol Inspection, Virtual Private Networking(VPN).Integrated Network Intrusion Prevention (IPS)Application Awareness and ControlAdditional Intelligence: Directory integration to tie security policies to users and groups; cloud-based reputation services to stop traffic from dangerous sourcesReal-time and historical visibility into user, network, and security activity

XTMvVirtualize the traditional gateway firewall for unprecedented flexibility –protecting the internal edge.WatchGuard XTMv protects not only the physical perimeter of the datacenter, but the “virtual edge.” Now you can easily implement policy that protects the data in the corporate database from the messaging infrastructure, or confidential HR information from financial data from other divisions – even when running on the same servers.Consolidate multiple firewalls for high-impact efficiencies –multi-tenant protection Service providers – hosting, cloud, or managed security services – can deploy multiple instances of XTMv on servers at the perimeter of their datacenters.

XCSvIntegrate with messaging and application servers for stronger protection – private-network deploymentAmong the most popular applications that organizations have chosen to implement within their virtual environments are messaging and web application servers; surveys of IT organizations consistently place Microsoft Exchange at or near the top of the list of virtualized services. Deploying XCSv virtual appliances within the same virtualized infrastructure allows content security on the same physical servers to be connected to the email and web servers using private networks, insulating all traffic from the public Internet.

Consolidate multiple security appliances for custom security – multi-tenant protection.Service providers – email hosting, cloud, or managed security services – can deploy multiple instances of XCSv in virtualized environments on shared industry standard servers within their datacenters.

Logging and ReportingMulti-appliance log aggregationHTML and PDF reportsSQL log databaseEncrypted, TCP-based log channelSNMP v2 & v3SyslogLogging and reporting with server health statusWeb-based configurable reports portal

WatchGuard Access Point The right product for businesses that require the flexibility of separate UTM and wireless hardware platforms while retaining single management console ease of use.One or many AP devices can be combined with a new or existing XTM device to extend UTM security to the WLAN.Separate wireless access points allow flexible deployment options. XTM appliance can be rack-mounted, while AP devices are located elsewhere in the office, extending coverage away from the XTM.Omni-directional internal antennas, plenum enclosure option, subtle design and PoE make the AP perfect for deployment in public spaces.

Securing Your Virtualized World :XTMv & XCSv Organizations of all sizes are turning to virtualization to reduce costs and increase the efficiency, availability, and flexibility of their IT resources. But virtualization comes at a cost. Virtual environments are complex to manage and vulnerable to security threats. IT must be prepared. Now applications can be secured, resources can be maximized and your IT department can reap the rewards of having a single, unified management system—without a security risk in sight. WatchGuard XTMv brings best-in-class network security to the world of virtualization. With real-time monitoring, multi-WAN support and scalable solutions to fit any sized business, your virtual environments can be just as secure as your physical one.

5 6

ComGuard

Page 6: Comguard E-Brochure

GFI MailEssentials Online™ is a comprehensive hosted email security and spam filtering service that is extremely easy to deploy and maintain. As a cloud-based service, GFI MailEssentials Online uses top-notch hosted spam filtering and multiple email security technologies to block 100% of viruses and over 99% of junk mail before they can enter your network. Its built-in continuity features allow you uninterrupted access to email even when your mail server is offline. In addition, an optional integrated archive service securely retains your important email messages for subsequent search and retrieval.

– Anti Spam Edition

– Email Security Edition

Archiving, Backup & Fax

Web & Mail SecurityNetwork and Security

Simple IT management Manage, monitor and secure your network with GFI Cloud.GFI Cloud gives you control of your IT environment in 10 minutes or less. Whether you have 5 or 500 employees, its simple web-based interface offers integrated antivirus, asset and network management across your workstations and servers. With an expanding range of award-winning software services, GFI Cloud provides a single integrated solution to streamline IT management.

7 8

ComGuard

Page 7: Comguard E-Brochure

gateprotect AG, Germany has been a leading, globally acting provider of IT security solutions in the area of network security for more than 10 years. These solutions comprise next generation firewalls with all commonly used UTM functions, managed security as well as VPN client systems.

LAN / WAN-SUPPORT- Ethernet 10/100 MBits/s- Gigabit and 10 Gigabit Ethernet*2- SFP and SFP+ Fibre optics support*2- MTU changeable (Ethernet/DSL)- PPP-PAP, PPP-CHAP authentication- Inactivity timeout / Forced disconnect time- xDSL- Multi WAN support- WAN failover- Loadbalancing- Time controlled internet connections- Manual and automatic DNS assignment- Multiple dynDNS support- Source based routing- Routing protocols RIP, OSPF- DHCP- DMZVLAN- 4094 VLAN per interface- 802.1q ethernet header tagging- Combinable with bridgingBridge-mode- OSI-Layer 2 firewall function- Spanning tree (bride-ID, port-cost)- Unlimited interfaces per bridge- Combinable with VPN-SSL

COMMAND CENTER- Monitor & Active Configuration of 500+ firewalls- Central Configuration and Monitoring of VPN Connections- Single and group backup- Plan automatic backup in groups- Single and group update & licensing- Create configuration templates and apply on multiple firewalls- Certificate Authority- Certificate based 4096 bit encrypted connections to the firewalls- Display settings of all firewalls- Role based User Management

www.gateprotect.com

NeXt GeNerAtioN utM FirewALL APPLiANceS

* System performance depends on activated proxies, IDS, application level and number of active VPN connections. We do not offer an express or implied warranty for the correct-ness /up-to-dateness of the information contained here (which may be change at any time). Future products or functions will be made available at the appropriate time.

©2013 gateprotect AG Germany. All rights reserved.

Next Generation Firewall GPz 1000 GPz 2500 GPz 5000

interfacesGBE Ports 10 18 18

SFP / SFP+ (Mini GBIC) Ports 4/0 4/0 4/2

Redundant - HDD (Raid) Yes Yes Yes

Redundant - Power supply Yes Yes Yes

VPN - Crypto acceleration Yes Yes Yes

IPMI - Remote management Yes Yes Yes

System Performance*Firewall throughput (Mbps) 7 500 10 000 20 000

VPN IPSec throughput (Mbps) 2 000 2 500 4 000

UTM throughput (Mbps) 1 000 1 500 2 500

IDS/IPS throughput (Mbps) 1 500 2 500 3 000

Concurrent sessions 2 000 000 2 500 000 3 500 000

New sessions pr. Second 25 000 30 000 40 000

dimensionsH x W x D (mms) 88 x 430 x 633 88 x 430 x 633 88 x 430 x 633

Gross Weights (kgs) 18 18 18

PowerInput Voltage (V) AC 100-240 AC 100-240 AC 100-240

Consumption (W) - full load / rating

Total Heat Dissipation - full load / rating

Redundant Power Supply yes yes yes

environmentalOperating Temperature (°C) 10 ~ 40 10 ~ 40 10 ~ 40

Storage Temperature (°C) -40 ~ 65 -40 ~ 65 -40 ~ 65

Relative Humidity (Non condensing) 10 ~ 85% 10 ~ 85% 10 ~ 85%

Next Generation utM GPo 100 GPo 150 GPA 300 GPA 500 GPX 650 GPX 850

interfacesGBE Ports 4 4 4 6 8 8

System Performance*Firewall throughput (Mbps) *1 1 700 1 900 2 100 6 000 7 500

VPN IPSec throughput (Mbps) *1 200 250 320 700 1 500

UTM throughput (Mbps) - 100 180 300 450 1 000

IDS/IPS throughput (Mbps) - 250 300 400 1 200 1 500

dimensionsH x W x D (mms) *1 42 x 210 x 210 44 x 426 x 238 44 x 426 x 238 44 x 426 x 365 44 x 426 x 365

Gross Weights (kgs) *1 2.9 3 3 6 6

PowerInput Voltage (V) *1 AC 100-240 AC 100-240 AC 100-240 AC 100-240 AC 100-240

Consumption (W) - full load *1 35 41 41 66 66

environmentalOperating Temperature (°C) *1 0 ~ 40 0 ~ 40 0 ~ 40 0 ~ 40 0 ~ 40

Storage Temperature (°C) *1 -10 ~ 70 -10 ~ 70 -10 ~ 70 -10 ~ 70 -10 ~ 70

Relative Humidity (Non condensing) *1 20 ~ 90% 20 ~ 90% 20 ~ 90% 20 ~ 90% 20 ~ 90%

*1 - to be announced later

from Q4/2013

NEXT GENERATION UTM FIREWAL APPLIANCES

CUTTING-EDGE SECURITY FEATURESThe changing network security requirements of the market mean that companies demand the next generation of security systems to meet the challenge. gateprotect combines a wide range of the most modern and innovative security functions in a single system, the gateprotect “Next Generation UTM Firewall Appliances”.

MANAGEMENT- Role based Firewall Administration- SSH-CLI- Desktop configuration saved / restored separately from backup- Object oriented firewall configuration- Direct Client Update functionErgonomic Graphic User Interface- ISO 9241 compliant- Immediate visual feedback for each setting- Self-explanatory functions- Overview of all active services- Overview of the whole network- Layer and zoom function

USER AUTHENTICATION- Active Directory / OpenLDAP support- Local User database- Web-interface authentication- Windows-client authentication- Single sign on with Kerberos- Single- and Multi login- Web Landing page

TRAFIC SHAPING / QOS- Multiple Internet connections separately shapeable- All services separately shapeable- Maximum and guaranteed bandwidth adjustable- QoS with TOS-flags support- QoS inside VPN connection support

HIGH AVAILABILITY- Active-passive HA- State synchronization- Single and Multiple dedicated links support- Stateful Failover

BACKUP & RECOVERY- Small backup files- Remote backup & restore- Restore backup on installation- Automatic and time based backups- Automatic upload of backups on FTPor SCP-Server - USB Drive recovery option

LOGS, REPORTS, STATISTICS- Email Reporting- Logging to multiple syslog-servers- Logs in admin-client (with filter)- Export to CSV-files- IP and IP-group statistics- Separate services- Single user / groups- TOP-lists (Surfcontrol)- IDS- / Traffic-statistics- Application Control traffic statistics- Antivirus- / Antispam-statistics- Defence statistics

MONITORING*- System Info (CPU, HDD, RAM)- Network (interfaces, routing, traffic, errors)- Processes- VPN- User AuthenticationSNMP- SNMPv2c- SNMP-traps- HA*

UNIFIED THREAT MANAGEMENT*Web-filter- URL-Filter with safe search enforcement- Content Filter- Block rules up to user-level- Black-/ White lists- Import / Export of URL lists- File Extension blocking- Category based website-blocking- Self definable categories- Scan technology with online-database- Intransparent HTTP-proxy supportApplication Control- Layer 7 Packet filter (DPI)- Filter Applications instead of ports- Detection & Control of Skype, Bittorrentand others as well as Web 2.0 Applicationslike FacebookAntivirus- Kaspersky Anti-Virus Engine- Complete Protection from all malware- HTTP, HTTPS- FTP, POP3, SMTP- Exceptions definable- Manual and automatic updatesAntispam- Scan-level adjustable- Real-time Spam Detection- GlobalView Cloud using RecurrentPattern Detection (RPD)- Mail Filter- Black- / White lists- Automatically reject/delete emails- AD Email address importIntrusion Prevention- Individual custom rules- Security-level adjustable- Rule groups selectable- Exceptions definable- Scanning of all interfaces- DoS, portscan protection- Malicious network packet protectionProxies- HTTP (transparent or intransparent)- HTTPS- Support for Radius server, AD server,local user database- FTP, POP3, SMTP, SIP- Time-controlled

VPN- VPN wizard- Certificate wizard- Site-to-Site- Client-to-Site (Road Warrior)- PPTP- Export to One-Click-ConnectionX.509 certificates- CRL- OCSP- Multi CA support- Multi Host-cert supportIPSec- Tunnel mode- IKEv1, IKEv2- PSK / Certificates- DPD (Dead Peer Detection)- NAT-T- XAUTH, L2TPSSL- Routing mode VPN- Bridge mode VPN- TCP/UDP- Specify WINS- and DNS-Servers

www.gateprotect.com

NeXt GeNerAtioN utM FirewALL APPLiANceS

* System performance depends on activated proxies, IDS, application level and number of active VPN connections. We do not offer an express or implied warranty for the correct-ness /up-to-dateness of the information contained here (which may be change at any time). Future products or functions will be made available at the appropriate time.

©2013 gateprotect AG Germany. All rights reserved.

Next Generation Firewall GPz 1000 GPz 2500 GPz 5000

interfacesGBE Ports 10 18 18

SFP / SFP+ (Mini GBIC) Ports 4/0 4/0 4/2

Redundant - HDD (Raid) Yes Yes Yes

Redundant - Power supply Yes Yes Yes

VPN - Crypto acceleration Yes Yes Yes

IPMI - Remote management Yes Yes Yes

System Performance*Firewall throughput (Mbps) 7 500 10 000 20 000

VPN IPSec throughput (Mbps) 2 000 2 500 4 000

UTM throughput (Mbps) 1 000 1 500 2 500

IDS/IPS throughput (Mbps) 1 500 2 500 3 000

Concurrent sessions 2 000 000 2 500 000 3 500 000

New sessions pr. Second 25 000 30 000 40 000

dimensionsH x W x D (mms) 88 x 430 x 633 88 x 430 x 633 88 x 430 x 633

Gross Weights (kgs) 18 18 18

PowerInput Voltage (V) AC 100-240 AC 100-240 AC 100-240

Consumption (W) - full load / rating

Total Heat Dissipation - full load / rating

Redundant Power Supply yes yes yes

environmentalOperating Temperature (°C) 10 ~ 40 10 ~ 40 10 ~ 40

Storage Temperature (°C) -40 ~ 65 -40 ~ 65 -40 ~ 65

Relative Humidity (Non condensing) 10 ~ 85% 10 ~ 85% 10 ~ 85%

Next Generation utM GPo 100 GPo 150 GPA 300 GPA 500 GPX 650 GPX 850

interfacesGBE Ports 4 4 4 6 8 8

System Performance*Firewall throughput (Mbps) *1 1 700 1 900 2 100 6 000 7 500

VPN IPSec throughput (Mbps) *1 200 250 320 700 1 500

UTM throughput (Mbps) - 100 180 300 450 1 000

IDS/IPS throughput (Mbps) - 250 300 400 1 200 1 500

dimensionsH x W x D (mms) *1 42 x 210 x 210 44 x 426 x 238 44 x 426 x 238 44 x 426 x 365 44 x 426 x 365

Gross Weights (kgs) *1 2.9 3 3 6 6

PowerInput Voltage (V) *1 AC 100-240 AC 100-240 AC 100-240 AC 100-240 AC 100-240

Consumption (W) - full load *1 35 41 41 66 66

environmentalOperating Temperature (°C) *1 0 ~ 40 0 ~ 40 0 ~ 40 0 ~ 40 0 ~ 40

Storage Temperature (°C) *1 -10 ~ 70 -10 ~ 70 -10 ~ 70 -10 ~ 70 -10 ~ 70

Relative Humidity (Non condensing) *1 20 ~ 90% 20 ~ 90% 20 ~ 90% 20 ~ 90% 20 ~ 90%

*1 - to be announced later

from Q4/2013

www.gateprotect.com

NeXt GeNerAtioN utM FirewALL APPLiANceS

* System performance depends on activated proxies, IDS, application level and number of active VPN connections. We do not offer an express or implied warranty for the correct-ness /up-to-dateness of the information contained here (which may be change at any time). Future products or functions will be made available at the appropriate time.

©2013 gateprotect AG Germany. All rights reserved.

Next Generation Firewall GPz 1000 GPz 2500 GPz 5000

interfacesGBE Ports 10 18 18

SFP / SFP+ (Mini GBIC) Ports 4/0 4/0 4/2

Redundant - HDD (Raid) Yes Yes Yes

Redundant - Power supply Yes Yes Yes

VPN - Crypto acceleration Yes Yes Yes

IPMI - Remote management Yes Yes Yes

System Performance*Firewall throughput (Mbps) 7 500 10 000 20 000

VPN IPSec throughput (Mbps) 2 000 2 500 4 000

UTM throughput (Mbps) 1 000 1 500 2 500

IDS/IPS throughput (Mbps) 1 500 2 500 3 000

Concurrent sessions 2 000 000 2 500 000 3 500 000

New sessions pr. Second 25 000 30 000 40 000

dimensionsH x W x D (mms) 88 x 430 x 633 88 x 430 x 633 88 x 430 x 633

Gross Weights (kgs) 18 18 18

PowerInput Voltage (V) AC 100-240 AC 100-240 AC 100-240

Consumption (W) - full load / rating

Total Heat Dissipation - full load / rating

Redundant Power Supply yes yes yes

environmentalOperating Temperature (°C) 10 ~ 40 10 ~ 40 10 ~ 40

Storage Temperature (°C) -40 ~ 65 -40 ~ 65 -40 ~ 65

Relative Humidity (Non condensing) 10 ~ 85% 10 ~ 85% 10 ~ 85%

Next Generation utM GPo 100 GPo 150 GPA 300 GPA 500 GPX 650 GPX 850

interfacesGBE Ports 4 4 4 6 8 8

System Performance*Firewall throughput (Mbps) *1 1 700 1 900 2 100 6 000 7 500

VPN IPSec throughput (Mbps) *1 200 250 320 700 1 500

UTM throughput (Mbps) - 100 180 300 450 1 000

IDS/IPS throughput (Mbps) - 250 300 400 1 200 1 500

dimensionsH x W x D (mms) *1 42 x 210 x 210 44 x 426 x 238 44 x 426 x 238 44 x 426 x 365 44 x 426 x 365

Gross Weights (kgs) *1 2.9 3 3 6 6

PowerInput Voltage (V) *1 AC 100-240 AC 100-240 AC 100-240 AC 100-240 AC 100-240

Consumption (W) - full load *1 35 41 41 66 66

environmentalOperating Temperature (°C) *1 0 ~ 40 0 ~ 40 0 ~ 40 0 ~ 40 0 ~ 40

Storage Temperature (°C) *1 -10 ~ 70 -10 ~ 70 -10 ~ 70 -10 ~ 70 -10 ~ 70

Relative Humidity (Non condensing) *1 20 ~ 90% 20 ~ 90% 20 ~ 90% 20 ~ 90% 20 ~ 90%

*1 - to be announced later

from Q4/2013

9 10

ComGuard

Page 8: Comguard E-Brochure

HSM OverviewSafeNet Hardware Security Modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services. SafeNet HSMs are ranked #1 in the market worldwide. They provide the highest-performing, most secure, and easiest-to-integrate application and transaction security solution for enterprise and government organizations.With a broad range of HSM offerings and a full range of API support, SafeNet HSMs enable application developers to easily integrate security into custom applications. In partnership with leading application solution providers, SafeNet has produced HSMs that offer end-to-end protection for organizations, helping them achieve regulatory compliance, streamline business processes, reduce legal liabilities, and improve profitability .Today, organizations are asking: How can I ensure my keys are protected throughout the key life-cycle? Can hardware security modules help my company meet compliance mandates? Should I consider an HSM if I need to accelerate my cryptographic operations? How can HSMs help secure my assets in the cloud?

Hardware Security Module (HSMs)SafeNet Hardware Security Modules (HSMs) provide reliable protection for applications, transactions and information assets by securing cryptographic keys. SafeNet HSMs are the fastest, most secure, and easiest to integrate application security solution for enterprise and government organizations to achieve regulatory compliance, reduce the risk of legal liability, and improve profitability.

Data Encryption & ControlSafeNet offers a broad range of Data Encryption and Control solutions that enable organizations to move past silo constrained encryption and to centrally, uniformly deploy encryption in a scalable manner that spans the enterprise, and effectively control their security policies. SafeNet solutions deliver unmatched coverage—securing databases, applications, personal identifiable information (PII), and storage in the physical and virtual datacenter and the cloud. Moreover, SafeNet also provides the critical key management needed to effectively and efficiently enable protection across the enterprise wherever data resides. With SafeNet, organizations can apply data protection where they need it, when they need it, and how they need it – consistently and effectively.

Multi factor AuthenticationMulti-factor authentication serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be. Yet the recent surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control - like SaaS applications and mobile device management - represents a shift in how trust and control is established and maintained.New threats, risks, and vulnerabilities as well as evolving business requirements underscore to the need for a strong authentication approach based on control, choice, and future-forward scalability.

Network Encryption ProductsProven reliability, highest throughput, and lowest latency make SafeNet’s network security devices the ideal solution for protecting data in motion, including time-sensitive voice and video streams. SafeNet’s network security devices provide the fastest and easiest way to integrate robust, FIPS-certified network security to protect data for enterprise and government organizations.

Enterprise Key ManagementWith SafeNet, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key managementlifecycle and throughout the enterprise. SafeNet solutions can manage keys across heterogeneous encryption platforms, offering support for the KMIP standard as well as proprietary interfaces. Now, security teams can uniformly view, control, and administer cryptographic policies and keys for all their sensitive data—whether it resides in the cloud, in storage, in databases, or virtually anywhere else.

11 12

ComGuard

SafeNet is a leading global provider of data protection. For over 25 years, Fortune 500 global corporations and government agencies have turned to SafeNet to secure and protect their most valuable data assets and intellectual property. SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

General Purpose HSMsCrypto HypervisorLuna SALuna PCI-ELuna G5Luna CA4Luna SPProtectServerProtectServer External

Payment HSMsLuna EFTView PIN

Product CertificationsFIPS 140-2Common CriteriaPIC ComplianceIdenTrust Compliance

Data Encryption & Control ProductsSafeNet Data Encryption and Control solutions enable you to protect and control sensitive data as it expands in volume, type and location, from the data center to virtual environments and the cloud while improving compliance and governance visibility and efficiencies through centralized management and policy enforcement.

Crypto Foundation Deliver root of trust services for services for enterprise-wide data protection

KeySecure DataSecureKeySecure Interoperability

Structured Data Protection Protect regulated data in databases and applications

Tokenization Manager ProtectDB ProtectApp

Unstructured Data Protection Protect regulated Data in files and storage

StorageSecure ProtectFile SafeMonk

Cloud Security Assure ownership, isolation and compliance of virtualized data

ProtectV

Ethernet EncryptionSafeNet offers Ethernet Encryptors that deliver instant protection across the network at Layer2, adding far less latency to mission-critical applications than traditional Layer 3 solutions like IPsec VPNs.

1G & 10G Ethernet10MB & 100MB Ethernet Branch

Fibre Channel EncryptionSafeNet Fibre Channel Encryptors are a high performance, purpose-built integrated security solution providing point to point encryption for 1,2 and 4 Gbps Fibre Channel networks

Page 9: Comguard E-Brochure

Security Configuration ManagementSecurity Configuration Management: Tripwire EnterpriseWhy is the solution relevant and important to an enterprise

Data breaches continue to rank as a top threat to corporate environments, as more and more attackers successfully find their way into networks. While there’s no such thing as a 100 percent secure IT environment, taking the fundamental steps to assess and harden IT systems is basic “blocking and tackling” that eliminates the root cause of the vast majority of breaches. These steps include (1) Assess and inventory configurations on all servers and devices, and com¬pare the results to some understood, recognized security standard (like CIS, NIST, or ISO 27001) and (2) Gain immediate, real-time insight into any changes to the files, configura¬tions items and states that define this security standard. By eliminating the “easy ins” (like open ports and unused services, the use of default or easily guessed administrator passwords, or improperly configured firewalls), and keeping continuous watch on these systems, it enables the enterprise to reduce the attack surface while detecting the events and changes that indicate attacks in progress—like secu¬rity controls disabled by anti-forensic activities, oddly elevated permissions, or unexpected changes to critical files.

What benefits will the enterprise derive by implementing the solutionEnterprises significantly reduce the attack surface with an end-to-end, continuous SCM solution for policy management, integrity monitoring and change auditing. Tripwire’s award-winning SCM solution delivers a scalable, automated way to ensure system integrity and continual system hardening of enterprise systems. By continuously monitoring all configurations and changes across the enterprise, organizations achieve and maintain a known, trusted state to reduce risk, prevent audit failures by complying with standards, and assure high availability across the extended enterprise.

The actual product and insight into the product from the solution perspectiveTripwire’s Continuous Security Configuration Management (SCM) solutions help organizations of all shapes and sizes successfully automate the hardening of their IT infrastructure and continuously monitor the integrity of those systems. Security Configuration Management is one of the most effective and cost-effective security controls you can implement, and it’s foundational to many regulatory standards and security frameworks. Tripwire Enterprise and Tripwire CCM provide best-in-class SCM so you can measurably reduce your infrastructure’s attack surface while improving your security posture. Tripwire offers agent and agentless, best of breed Policy Management, File Integrity Monitoring, Configuration Management and Discovery solutions so you can effectively automate the configuration management of every device on your network. Tripwire’s next-generation approach delivers it continuously at the speed of change and in context of your business for total visibility of your risk.

SIEM – Security Incident & Event Management / Log IntelligenceEnterprise Log Intelligence: Tripwire Log Center

Why is the solution relevant and important to an enterpriseThe explosive increase in the volume of data and the number of targeted attacks along with their level of sophistication requires a proactive response by enterprises across the world. The greatest area of unmet need is effective targeted attack and breach detection. Today it takes weeks or months on average to detect a breach by even the most sophisticated and well prepared organization. Furthermore, the technology used to collect log data from across the network is unreliable and not secure. The need for a log intelligence layer has emerged to provide reliable & secure high-speed analysis and filtering of log and event data for faster detection of incidents.

What benefits will the enterprise derive by implementing the solutionEnterprises have confidence that they are securely & reliably collecting all logs to assure they have them for regulatory compliance and forensics efforts. By leveraging Tripwire Log Center, organizations can integrate their foundational security controls, intelligently analyze and filter all events, and reduce the volume of non-critical events and false positives. Tripwire Log Center prioritizes threats and security incidents based on the vulnerabilities, misconfigurations, unauthorized changes and value of the targeted assets. And Tripwire Log Center seamlessly integrates with the incident response processes, the Security Operations Center and the SIEM platform of choice to quickly alert and focus on the threats that pose the most serious risk to the business.

The actual product and insight into the product from the solution perspectiveTripwire’s Log Intelligence solution, Tripwire Log Center, collects, analyzes and correlates data to improve security and simplify compliance. Tripwire offers an innovative Log Intelligence solution that to provide secure and high speed log collection, analysis and filtering of log and event data, resulting in only actionable and relevant events being sent to IT security teams. The Tripwire solution offers SIEM capability or can support other SIEMS with secure and reliable agent-based log collection. Tripwire Log Center intelligently classifies and prioritizes events based on correlation of your foundational security controls: logs, configurations, vulnerabilities, and changes. Tripwire Log Center improves incident and breach detection by ensuring that all log data is analyzed and intelligently correlated with the business value of an asset, the detection of a potential threat and the understanding of the vulnerability state in one Log Intelligence solution.

Vulnerability ManagementEnterprise Vulnerability Management: Tripwire IP360

Why is the solution relevant and important to an enterpriseUnderstanding security risk on a global enterprise network is essential to comprehensive IT risk management and creating confidence in your security program. However, the high rate of change on enterprise networks, the constantly changing threat environment, and increased focus on internal and regulatory compliance have made this task increasingly difficult. Accurate identification of vulnerabilities and effective prioritization is the only answer to effectively dealing with this challenge. Integrated web application scanning. Today’s threat environment is unimaginably dynamic —with thousands of new vulnerabilities reported annually—the sheer volume of launched attacks demands best-in-class enterprise vulnerability management solutions to provide comprehensive discovery and management of critical vulnerabilities in support of the IT security lifecycle. Up-to-date vulnerability management is critical, especially as the time between vulnerability discovery and the release of an exploit is, in some cases, narrowing to zero. Furthermore, evolving technology constantly increases attack vectors into the enterprise, increasing the number of vulnerabilities and required patches across the entire network.

What benefits will the enterprise derive by implementing the solutionTripwire’s enterprise vulnerability management solutions intelligently discover all endpoints and networked assets, and apply advanced analytics to prioritize vulnerabilities in a meaningful framework - flagging the greatest risks so security teams can make quick, quality decisions within a rapidly changing threat landscape. Tripwire IP360 discovers a wealth of data about the critical systems that reside on your network, but rather than provide that data in an endless list like traditional solutions, Tripwire IP360 prioritizes remediation tasks, enabling users to focus on the items that will most effectively reduce risk on critical systems. This profiling and prioritization enables security teams to best use their valuable resources to reduce their highest vulnerability risk. Reports are available for all audiences, from technically-focused users to executives, providing a customized view into the state of the network.

The actual product and insight into the product from the solution perspectiveTripwire offers Enterprise Vulnerability Management Solutions that includes best of breed appliance-based vulnerability assessment and innovative cloud based scanning for the extended enterprise. Tripwire IP360, a leading enterprise vulnerability management solution, enables enterprises and government agencies to cost-effectively measure and manage their security risk. Using agentless technology, Tripwire IP360 has set the industry standard for depth and breadth of vulnerability discovery and coverage. It comprehensively profiles all networked devices and includes up-to-date coverage of the latest operating systems, applications, and vulnerabilities, providing the ideal foundation for assessing every system on the network. Tripwire IP360’s agentless architecture is designed for rapid deployment and ease of management across large, globally-distributed networks. WebApp360, the web application scanner included with Tripwire IP360, extends Tripwire’s market-leading vulnerability management suite to include assessment of enterprise web applications, offering the industry’s most comprehensive view of application security risks. WebApp360 enables enterprises to automatically and continuously detect critical web application vulnerabilities within the context of overall IT risk, enabling security teams to focus resources on the most important risks. Together, Tripwire IP360 and Tripwire WebApp360 offer customers an unprecedented, prioritized assessment of IT security risk, from web applications to the underlying IT infrastructure supporting them.

Tripwire delivers the industry’s best portfolio of solutions for critical security controls including; security configuration management, vulnerability management, file integrity monitoring, and log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats.

Provide continuous, flexible monitoring of the entire IT infrastructure to immediately determine when changes adversely affect your security and compliance Automate and assure regulatory and policy compliance Deliver actionable, risk-based insight and analytics aligned with business initiativesMeasure security performance against internal goals Offer flexible deployment options including on premise, cloud-based or hybrid

13 14

ComGuard

Page 10: Comguard E-Brochure

Netsweeper Solution AdvantagesNo software needed on site.

Deployments are simple and easy. Hosted options available for SME/SMB.

Device ‘agnostic’.Network-based filtering applies across any and all connected devices.

Excellent zero hour protection.We categorize new web threats within seconds of a user finding them.

Zero latency.No latency is introduced to permitted web traffic.

Asymmetric Support.Just show us the outbound web requests and we’ll do the rest.

Minimal Capital CostsGet the solution deployed with a minimum of upfront investment/risk.

Netsweeper Solutions for Enterprise Web Filtering & Security As a software solution that installs on commodity-grade hardware, Netsweeper specializes in web filtering. You get the protection you need, quickly, easily and at a manageable total cost of ownership. Our flexible licensing models also mean you have room to grow with us without fear of outages.

Increase productivity develop and maintain Safe employee browsingSolidify network security, block compromised sites and scan downloads formalware crushing infectionsBoost bandwidth with Web 2.0 by blocking inappropriate downloads such asgames and video streamingScan HTTPS-encrypted traffic giving extra security and infection controlReporting snapshots access to granular reporting visualize your organizationalbrowsing behavior in line with audit standardsMultiple deployment modes Active directory integration, Proxy deployment and further enterprise custom requirementsLocal support guaranteed with a trained channel and reseller networkcomplimented with a certified engineering team

Netsweeper features,capabilities and specifications

CATEGORIZATION / FILTERINGNo latency for approved trafficOver 50 predefined categoriesCustom category supportGranular, URI-based filteringConfigurable custom categoriesDynamic categorization of new URIsA ‘learning’ local cacheFiltering for HTTP and HTTPS/SSL Detect & block anonymous proxiesIM & P2P blockingMalware, phishing & virus blockingLocal allow/deny listsWeb 2.0 CategorisationApplication/protocol blocking

POLICY MANGEMENTGranular policies by user, group, site, etcTime of day policies‘Safe Search’ enforcementKeyword enforcementDefault & guest filtering policiesMinimum filtering policy optionsBypass/override options (w. tracking) Standard and custom block pagesThresholds & “ban/lock out” optionseSafety “warning messages”YouTube for Schools support

ADMINISTRATION / REPORTINGComprehensive Web AdminSecure Remote AdministrationDelegated AdministrationDetailed usage & traffic loggingStandard and custom reportsExportable/integrated reportsReal time and historical reportsSNMP supportURL Alerts (submit for human review)Reports by category/user/group/time

AUTHENTICATION Integration to LDAP, Radius, and ADTransparent authentication optionsCaptive portal login supportBrowser based authentication

DEPLOYMENT OPTIONSClustering and multi tenant supportDPI integrationNetwork TAP/Bridge Port mirroringSquid proxyCisco/Sandvine/Procera integrationClient filter (windows/Mac)Web API available for integrations

SYSTEM REQUIREMENTSMinimum recommended:2GHz processor, 4GB RAM, 250GB HD1 or more Network Interfaces, Netsweeper varies depending on traffic volume and deployment model. Multiple server deployment is also supported Virtualized deployment options

Netsweeper helps businesses to improve productivity, mitigate liability, and reduce the impact of web threats. We ensure you can reap the benefits of the web while avoiding the risks to your systems and your business. Best of all, we make it easy to achieve, and we help you control your total cost of ownership.”

Andrew Graydon,COO.

Web Filtering for EnterpriseLeveraging the power of the web can be a challenge for the small business (and the not-so-small business). Web threats, malware and phishing can all put business information at risk, and of course productivity can be a challenge in the face of online video, social media, online games and other distractions. Today’s companies often don’t have the IT resources to buy and maintain filtering appliances or install client software across all computers in the business.

The Cost of Lost ProductivityA 2012 salary.com survey reports that 64% of employees spend time surfing the Internet on websites unrelated to work. 39% of responders claimed to spend less than an hour a week, but 61% of those spent 2 or more hours a week on unproductive surfing. For a 10-person SMB with staff earning $20/hour, averaging 30 minutes of daily time wasted, this translates into a $2100/month productivity problem.

Excellent Zero Hour ProtectionToday, dynamic, federated content and content is generated through feeds, mashups and browsers that run AJAX scripts. Multiple injection points means dozens of URIs in a single page. Translation: Web Threats are a bigger issue today than they have ever been!Any time a new URI is encountered by one of our 400 million-plus users, it is referred to our cloud-hosted categorization engines, where heuristic analysis of all content is performed to categorize the page/information

About NetsweeperNetsweeper Inc. provides carrier-grade web content filtering and web threat management that protects more than 400 million users worldwide. With more than a decade of experience in the filtering market, Netsweeper solutions ensure compliance with regulations, defend against web-based threats and help deliver a positive, productive and safe Internet experience.

Netsweeper web filtering is hardware-agnostic, AI-based, and its ‘in-the-cloud’ CNS (category name servers) are continuously updated by the web use of millions of users worldwide. We deliver better protection at a lower total cost of ownership.

Netsweeper supports customers worldwide with offices in North America, Europe, Asia and the Middle East as well as a network of partners and distributors.

Visual analytics of browsing

15 16

ComGuard

Industry leading web filter

Comprehensive web security

Competitive low cost of ownership

Hardware Free no large appliances

400 Million users across the globe

Global references in Key Accounts

Page 11: Comguard E-Brochure

®Clavister delivers the security solutions required for market leaders to optimize their networks – today and tomorrow. Driven by a passion for innovative design, simplicity and extreme performance, we offer a portfolio of high performance network security products designed specifically for Cloud, Enterprise and Telecoms environments.

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w3 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W3

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W3 is highly suited as a security gateway for larger remote/branch offices or as an entry-level enterprise security gateway. The Clavister W3 delivers next-generation firewall security at a break-through price point, offering flexibility and robust features without compromising security.

The Clavister W3 is an ideal solution for any organization that needs premium network security in a cost-effective package.

Key Features

� Support for Clavister Application Control

� High Availability Support included

� Support for Clavister Security Subscription

Key Benefits

� Great value for money

� Easy to set up and use

Clavister W3 Specifications

W3 W3 ProFirewall Performance (Gbps) 3 6

VPN Performance (Mbps) 200 400

Concurrent Connections 500 000 1 000 000

Concurrent VPN Tunnels (SSL/IPsec) 500/500 1 000/1 000

Ethernet Interfaces 6 x 1GbE (RJ45)

Management/High Availability Ports 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 256 512

Virtual Routers 10 25

Clavister OS Clavister cOS Core

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: x8 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterLynxSeriesClavister X8

Clavister Lynx Series – rugged and durable, with outstanding perfor-mance

The Clavister X8 is targeted at those installations where standard security products are unable to function reliably. With its industrial, rugged design, the durable Clavister X8 can withstand harsh, industrial environments and deliver outstanding solid performance. It also offers unified security management between office and industry environments. The Clavister X8 is perfect for tough environments, such as remote industrial locations, offshore installations and other demanding environments where high-end security is required.

Key Features

� Fast, powerful firewall

� Support for Clavister Application Control

� Support for Clavister Security Subscription

� Industry standards

Key Benefits

� Perfect for demanding applications

� Unified Security Management

Clavister X8 Specifications

X8 X8 ProFirewall Performance (Mbps) 500 1 000

VPN Performance (Mbps) 100 200

Concurrent Connections 100 000 200 000

Concurrent VPN Tunnels (SSL/IPsec) 100/100 250/250

Ethernet Interfaces 4 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 128 256

Virtual Routers 5 10

Clavister OS Clavister cOS Core

Form Factor Industrial DIN-mount

CL

AV

IST

ER

LY

NX

SE

RIE

S

LynxSeries

Clavister X8

WolfSeries

Clavister W3

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: e7 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterEagleSeriesClavister E7

Clavister Eagle Series – feature-rich, entry-level firewall, robust functionality

The Clavister Eagle Series is a set of network security products designed for remote access and branch office applications, which requires excellent performance, world-class design and innovative functionality.

The Clavister E7 is perfectly suited as a remote access firewall or as a branch office firewall, offering great performance and connectivity. The Clavister E7 offers great connectivity in a small, beautifully designed enclosure. It is full of capabilities, yet small enough to keep on the desktop. Its design is so stunning, you want to share it with others.

Key Features

� Powerful firewall

� Support for Clavister Application Control

� Support for Clavister Security Subscription

Key Benefits

� Easy to use, deploy and manage

� Unified Centralized Management

Clavister E7 Specifications

E7 Remote E7 E7 ProFirewall Performance (Mbps) 200 250 400

VPN Performance (Mbps) 20 50 80

Concurrent Connections 10 000 20 000 50 000

Concurrent VPN Tunnels (SSL/IPsec) 2/2 100/100 250/250

Ethernet Interfaces 8 x 1GbE (RJ45) switchblock + 3 1GbE (RJ45)

Virtual Interfaces (VLAN) 2 32 128

Virtual Routers 0 5 10

Clavister OS Clavister cOS Core

Form Factor Desktop

CL

AV

IST

ER

EA

GL

E S

ER

IES

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: v (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterVirtualSeriesClavister V3, V5, V7, V9

Clavister Virtual Series – excellent performance, feature-rich and efficient

The Clavister Virtual Series is a set of network security products designed for virtual and cloud-based security, offering excellent performance, powerful security features and is resource efficient. The Clavister Virtual Series offers powerful security features for your vir-tual environment and is easy to deploy your in market-leading VMware virtualization environ-ments. Its minimal footprint and extremely low resource requirements makes the Clavister V Series an optimal solution for all types of virtual and cloud-based network security solu-tions.

Key Features

� Low resource requirements

� Support for Clavister Application Control

� Powerful firewall

� Support for Clavister Security Subscription

Key Benefits

� Easy to use, deploy and manage

� Unified Centralized Management

Clavister Virtual Series Specifications

V3 V5 V7 V9Firewall Performance (Gbps) 1 3 5 10

VPN Performance (Gbps) 1 2 3 5

Concurrent Connections 100,000 250,000 500,000 1,000,000

Concurrent VPN Tunnels (SSL/IPsec) 500/500 1,000/1,000 1,500/1,500 2,000/2,000

Ethernet Interfaces Up to 3 Up to 5 Up to 7 Up to 10

Virtual Interfaces (VLAN) 32 128 512 1,024

Virtual Routers 10 15 25 50

Support Virtual Platform VMware ESXi

Clavister OS Clavister cOS Core

Form Factor Software

CL

AV

IST

ER

VIR

TU

AL

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: p9-chassis (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterPolarBearSeriesClavister P9 Chassis

Clavister P9 Chassis Specifications

P9 6002 P9 6006 P9 6014 P9 6016Firewall Performance (Gbps)* 80 160 480 560

VPN Performance (Gbps)* 40 80 240 280

Compliance PICMG 3.0, Rev. 2.0 ATCA Base Specification PICMG 3.0/3.1, Rev. 2.0 ATCA Base Specification

ATCA Blade Slots 2 4 12 14

Switch Blade Slots n/a 2 2 2

Cooling Fans 2 2 (removable) 2 front (removable), 2 back (removable) 2 front (removable), 2 back (removable)

Clavister OS Clavister cOS Stream Clavister cOS Stream Clavister cOS Stream Clavister cOS Stream

Form Factor 2U 19” ATCA rack-mount 6U 19” ATCA rack-mount 13U 19” ATCA rack-mount 13U 23” ATCA rack-mount13U ETSI 515 rack mount (optional)

* Performance reflect fully populated chassis.

Clavister PolarBear Series – robust ATCA design, uncompromising per-formance

The Clavister P9 Chassis offers the highest level of redundancy, scalability and perfor-mance possible. With capacity up to 560 Gbps, the AdvancedTCA-based chassis is capable of delivering the required processing power that telecom operators and large-scale data centers require.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Robust and reliable

� Extensible and powerful

CLA

VIS

TER

PO

LAR

BEA

R S

ERIE

S

EagleSeries

Clavister E7

VirtualSeries

Clavister V3, V5, V7, V9

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w5 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W5

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W5 is the perfect security solution for organizations with a large headquarters or as a main enterprise firewall. The Clavister W5 delivers stunning performance, up to 16 Gbps of next-generation firewall security in a single 1U 19” rack mount. With dedicated management and high-availability ports (two 1GbE RJ45), the Clavister W5 is the easiest network security solution when you need to make a bullet-proof, clustered solution.

This makes the Clavister W5 an ideal solution for organizations that need premium network security.

Key Features

� Support for Clavister Application Control

� Powerful, feature-rich firewall

� Support for Clavister Security Subscription

Key Benefits

� Excellent value for money

� Easy to use, deploy and manage

Clavister W5 Specifications

W5 W5 ProFirewall Performance (Gbps) 8 16

VPN Performance (Gbps) 1 2,5

Concurrent Connections 2 500 000 5 000 000

Concurrent VPN Tunnels (SSL/IPsec) 2 500/2 500 5 000/5 000

Ethernet Interfaces 2 x 10GbE (SFP+), 4 x 1GbE (SFP), 4 x 1GbE (RJ45)

Management/High Availability Ports 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 512 1 024

Virtual Routers 100 250

Clavister OS Clavister cOS Core

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w7 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W7

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W7 is targeted towards large data centers, service providers and high-end enterprise backbone security solutions. Clavister W7 delivers incredible performance, up to 20 Gbps in a single 1U 19” rack mount and is perfect for situations where security is first priority and speed is key to getting the job done.

For organizations with large investments in copper-based network infrastructure, the copper-centric approach of the Clavister W7 enables them to continue to utilize their invest-ment, and start to adopt newer fiber-based network components seamlessly. This makes the Clavister W7 the perfect solution bridging existing network solutions with newer fiber investments.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Dedicated management and HA ports

Key Benefits

� Excellent value for money

� Support for Clavister Security Subscription

Clavister W7 Specifications

W7 W7 ProFirewall Performance (Gbps) 10 20

VPN Performance (Gbps) 5 10

Concurrent Connections 5 000 000 10 000 000

Concurrent VPN Tunnels (IPsec) 5 000 10 000

Ethernet Interfaces 2 x 10GbE (SFP+), 4 x 1GbE (SFP), 16 x 1GbE (RJ45)

Management/High Availability Ports 2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 512 1 024

Virtual Routers 250 500

Clavister OS Clavister cOS Stream

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w8 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W8

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W8 is targeted towards large data centers, service providers and world-class enterprise backbone security solutions. The Clavister W8 delivers incredible performance, up to 40 Gbps in a single 1U 19 rack mount.

The fiber-centric approach of the Clavister W8 makes it a premium choice as the key firewall in a future-proofed installation and the perfect solution where premium security and speed is required.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Dedicated management and HA ports

Key Benefits

� Excellent value for money

� Support for Clavister Security Subscription

Clavister W8 Specifications

W8 W8 ProFirewall Performance (Gbps) 20 40

VPN Performance (Gbps) 10 20

Concurrent Connections 5 000 000 10 000 000

Concurrent VPN Tunnels (IPsec) 5 000 10 000

Ethernet Interfaces 8 x 10GbE (SFP+), 4 x 1GbE (SFP)

Management/High Availability Ports 2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 1 024 2 048

Virtual Routers 250 500

Clavister OS Clavister cOS Stream

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

WolfSeries

Clavister W5

WolfSeries

Clavister W7

WolfSeries

Clavister W8

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: x8 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterLynxSeriesClavister X8

Clavister Lynx Series – rugged and durable, with outstanding perfor-mance

The Clavister X8 is targeted at those installations where standard security products are unable to function reliably. With its industrial, rugged design, the durable Clavister X8 can withstand harsh, industrial environments and deliver outstanding solid performance. It also offers unified security management between office and industry environments. The Clavister X8 is perfect for tough environments, such as remote industrial locations, offshore installations and other demanding environments where high-end security is required.

Key Features

� Fast, powerful firewall

� Support for Clavister Application Control

� Support for Clavister Security Subscription

� Industry standards

Key Benefits

� Perfect for demanding applications

� Unified Security Management

Clavister X8 Specifications

X8 X8 ProFirewall Performance (Mbps) 500 1 000

VPN Performance (Mbps) 100 200

Concurrent Connections 100 000 200 000

Concurrent VPN Tunnels (SSL/IPsec) 100/100 250/250

Ethernet Interfaces 4 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 128 256

Virtual Routers 5 10

Clavister OS Clavister cOS Core

Form Factor Industrial DIN-mount

CL

AV

IST

ER

LY

NX

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: p9-blade (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterPolarBearSeriesClavister P9 Blade

Clavister PolarBear Series – robust ATCA design, uncompromising per-formance

The Clavister P9 Blades together with the Clavister P9 Chassis offers the highest level of redundancy, scalability and performance possible. With capacity up to 560 Gbps, the AdvancedTCA-based chassis is capable of delivering the required processing power that telecoms operators and large-scale data centers require.

The Clavister P9 Blades offers uncompromising power and performance. Organizations are able to keep adding as many Clavister P9 Blades as they can fit in a single Clavister P9 Chassis. The Clavister P9 Chassis offers the highest level of redundancy, scalability and performance possible.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Flexible configurations

Key Benefits

� Powerful processing blades

� Robust and reliable

� Extensible and powerful

Clavister P9 Blade Specifications

P9 BladeFirewall Performance (Gbps) 40

VPN Performance (Mbps) 20

Concurrent Connections 20 000 000

Concurrent VPN Tunnels (IPsec) 200 000

Ethernet Interfaces 4 x 10GbE (SFP+), 6 x 1GbE (SFP)

Virtual Interfaces (VLAN) 1 024

Virtual Routers 250

Clavister OS Clavister cOS Stream

Form Factor AdvancedTCA Blade

CL

AV

IST

ER

PO

LA

RB

EA

R S

ER

IES

PolarBearSeries

Clavister P9 Blade

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: p9-blade (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterPolarBearSeriesClavister P9 Blade

Clavister PolarBear Series – robust ATCA design, uncompromising per-formance

The Clavister P9 Blades together with the Clavister P9 Chassis offers the highest level of redundancy, scalability and performance possible. With capacity up to 560 Gbps, the AdvancedTCA-based chassis is capable of delivering the required processing power that telecoms operators and large-scale data centers require.

The Clavister P9 Blades offers uncompromising power and performance. Organizations are able to keep adding as many Clavister P9 Blades as they can fit in a single Clavister P9 Chassis. The Clavister P9 Chassis offers the highest level of redundancy, scalability and performance possible.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Flexible configurations

Key Benefits

� Powerful processing blades

� Robust and reliable

� Extensible and powerful

Clavister P9 Blade Specifications

P9 BladeFirewall Performance (Gbps) 40

VPN Performance (Mbps) 20

Concurrent Connections 20 000 000

Concurrent VPN Tunnels (IPsec) 200 000

Ethernet Interfaces 4 x 10GbE (SFP+), 6 x 1GbE (SFP)

Virtual Interfaces (VLAN) 1 024

Virtual Routers 250

Clavister OS Clavister cOS Stream

Form Factor AdvancedTCA Blade

CL

AV

IST

ER

PO

LA

RB

EA

R S

ER

IES

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: v (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterVirtualSeriesClavister V3, V5, V7, V9

Clavister Virtual Series – excellent performance, feature-rich and efficient

The Clavister Virtual Series is a set of network security products designed for virtual and cloud-based security, offering excellent performance, powerful security features and is resource efficient. The Clavister Virtual Series offers powerful security features for your vir-tual environment and is easy to deploy your in market-leading VMware virtualization environ-ments. Its minimal footprint and extremely low resource requirements makes the Clavister V Series an optimal solution for all types of virtual and cloud-based network security solu-tions.

Key Features

� Low resource requirements

� Support for Clavister Application Control

� Powerful firewall

� Support for Clavister Security Subscription

Key Benefits

� Easy to use, deploy and manage

� Unified Centralized Management

Clavister Virtual Series Specifications

V3 V5 V7 V9Firewall Performance (Gbps) 1 3 5 10

VPN Performance (Gbps) 1 2 3 5

Concurrent Connections 100,000 250,000 500,000 1,000,000

Concurrent VPN Tunnels (SSL/IPsec) 500/500 1,000/1,000 1,500/1,500 2,000/2,000

Ethernet Interfaces Up to 3 Up to 5 Up to 7 Up to 10

Virtual Interfaces (VLAN) 32 128 512 1,024

Virtual Routers 10 15 25 50

Support Virtual Platform VMware ESXi

Clavister OS Clavister cOS Core

Form Factor Software

CL

AV

IST

ER

VIR

TU

AL

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: p9-chassis (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterPolarBearSeriesClavister P9 Chassis

Clavister P9 Chassis Specifications

P9 6002 P9 6006 P9 6014 P9 6016Firewall Performance (Gbps)* 80 160 480 560

VPN Performance (Gbps)* 40 80 240 280

Compliance PICMG 3.0, Rev. 2.0 ATCA Base Specification PICMG 3.0/3.1, Rev. 2.0 ATCA Base Specification

ATCA Blade Slots 2 4 12 14

Switch Blade Slots n/a 2 2 2

Cooling Fans 2 2 (removable) 2 front (removable), 2 back (removable) 2 front (removable), 2 back (removable)

Clavister OS Clavister cOS Stream Clavister cOS Stream Clavister cOS Stream Clavister cOS Stream

Form Factor 2U 19” ATCA rack-mount 6U 19” ATCA rack-mount 13U 19” ATCA rack-mount 13U 23” ATCA rack-mount13U ETSI 515 rack mount (optional)

* Performance reflect fully populated chassis.

Clavister PolarBear Series – robust ATCA design, uncompromising per-formance

The Clavister P9 Chassis offers the highest level of redundancy, scalability and perfor-mance possible. With capacity up to 560 Gbps, the AdvancedTCA-based chassis is capable of delivering the required processing power that telecom operators and large-scale data centers require.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Robust and reliable

� Extensible and powerful

CLA

VIS

TER

PO

LAR

BEA

R S

ERIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w3 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W3

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W3 is highly suited as a security gateway for larger remote/branch offices or as an entry-level enterprise security gateway. The Clavister W3 delivers next-generation firewall security at a break-through price point, offering flexibility and robust features without compromising security.

The Clavister W3 is an ideal solution for any organization that needs premium network security in a cost-effective package.

Key Features

� Support for Clavister Application Control

� High Availability Support included

� Support for Clavister Security Subscription

Key Benefits

� Great value for money

� Easy to set up and use

Clavister W3 Specifications

W3 W3 ProFirewall Performance (Gbps) 3 6

VPN Performance (Mbps) 200 400

Concurrent Connections 500 000 1 000 000

Concurrent VPN Tunnels (SSL/IPsec) 500/500 1 000/1 000

Ethernet Interfaces 6 x 1GbE (RJ45)

Management/High Availability Ports 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 256 512

Virtual Routers 10 25

Clavister OS Clavister cOS Core

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: e7 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterEagleSeriesClavister E7

Clavister Eagle Series – feature-rich, entry-level firewall, robust functionality

The Clavister Eagle Series is a set of network security products designed for remote access and branch office applications, which requires excellent performance, world-class design and innovative functionality.

The Clavister E7 is perfectly suited as a remote access firewall or as a branch office firewall, offering great performance and connectivity. The Clavister E7 offers great connectivity in a small, beautifully designed enclosure. It is full of capabilities, yet small enough to keep on the desktop. Its design is so stunning, you want to share it with others.

Key Features

� Powerful firewall

� Support for Clavister Application Control

� Support for Clavister Security Subscription

Key Benefits

� Easy to use, deploy and manage

� Unified Centralized Management

Clavister E7 Specifications

E7 Remote E7 E7 ProFirewall Performance (Mbps) 200 250 400

VPN Performance (Mbps) 20 50 80

Concurrent Connections 10 000 20 000 50 000

Concurrent VPN Tunnels (SSL/IPsec) 2/2 100/100 250/250

Ethernet Interfaces 8 x 1GbE (RJ45) switchblock + 3 1GbE (RJ45)

Virtual Interfaces (VLAN) 2 32 128

Virtual Routers 0 5 10

Clavister OS Clavister cOS Core

Form Factor Desktop

CL

AV

IST

ER

EA

GL

E S

ER

IES

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w7 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W7

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W7 is targeted towards large data centers, service providers and high-end enterprise backbone security solutions. Clavister W7 delivers incredible performance, up to 20 Gbps in a single 1U 19” rack mount and is perfect for situations where security is first priority and speed is key to getting the job done.

For organizations with large investments in copper-based network infrastructure, the copper-centric approach of the Clavister W7 enables them to continue to utilize their invest-ment, and start to adopt newer fiber-based network components seamlessly. This makes the Clavister W7 the perfect solution bridging existing network solutions with newer fiber investments.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Dedicated management and HA ports

Key Benefits

� Excellent value for money

� Support for Clavister Security Subscription

Clavister W7 Specifications

W7 W7 ProFirewall Performance (Gbps) 10 20

VPN Performance (Gbps) 5 10

Concurrent Connections 5 000 000 10 000 000

Concurrent VPN Tunnels (IPsec) 5 000 10 000

Ethernet Interfaces 2 x 10GbE (SFP+), 4 x 1GbE (SFP), 16 x 1GbE (RJ45)

Management/High Availability Ports 2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 512 1 024

Virtual Routers 250 500

Clavister OS Clavister cOS Stream

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w8 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W8

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W8 is targeted towards large data centers, service providers and world-class enterprise backbone security solutions. The Clavister W8 delivers incredible performance, up to 40 Gbps in a single 1U 19 rack mount.

The fiber-centric approach of the Clavister W8 makes it a premium choice as the key firewall in a future-proofed installation and the perfect solution where premium security and speed is required.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Dedicated management and HA ports

Key Benefits

� Excellent value for money

� Support for Clavister Security Subscription

Clavister W8 Specifications

W8 W8 ProFirewall Performance (Gbps) 20 40

VPN Performance (Gbps) 10 20

Concurrent Connections 5 000 000 10 000 000

Concurrent VPN Tunnels (IPsec) 5 000 10 000

Ethernet Interfaces 8 x 10GbE (SFP+), 4 x 1GbE (SFP)

Management/High Availability Ports 2 x 10GbE (SFP+), 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 1 024 2 048

Virtual Routers 250 500

Clavister OS Clavister cOS Stream

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: w5 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

clavisterWolfSeriesClavister W5

Clavister Wolf Series – high performance, excellent scalability and robust functionality

The Clavister W5 is the perfect security solution for organizations with a large headquarters or as a main enterprise firewall. The Clavister W5 delivers stunning performance, up to 16 Gbps of next-generation firewall security in a single 1U 19” rack mount. With dedicated management and high-availability ports (two 1GbE RJ45), the Clavister W5 is the easiest network security solution when you need to make a bullet-proof, clustered solution.

This makes the Clavister W5 an ideal solution for organizations that need premium network security.

Key Features

� Support for Clavister Application Control

� Powerful, feature-rich firewall

� Support for Clavister Security Subscription

Key Benefits

� Excellent value for money

� Easy to use, deploy and manage

Clavister W5 Specifications

W5 W5 ProFirewall Performance (Gbps) 8 16

VPN Performance (Gbps) 1 2,5

Concurrent Connections 2 500 000 5 000 000

Concurrent VPN Tunnels (SSL/IPsec) 2 500/2 500 5 000/5 000

Ethernet Interfaces 2 x 10GbE (SFP+), 4 x 1GbE (SFP), 4 x 1GbE (RJ45)

Management/High Availability Ports 2 x 1GbE (RJ45)

Virtual Interfaces (VLAN) 512 1 024

Virtual Routers 100 250

Clavister OS Clavister cOS Core

Form Factor 19” Rack Mountable (1U)

CL

AV

IST

ER

WO

LF

SE

RIE

S

PolarBear Series

Clavister P9 Chassis

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: p8 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

C

LA

VIS

TE

R P

OL

AR

BE

AR

SE

RIE

S

clavisterPolarBearSeriesClavister P8

Clavister PolarBear Series – highest performance and scalability, smallest footprint

The Clavister PolarBear Series is a set of network security products designed for telecom operators and large-scale data centers requiring high performance, excellent scalability and robust functionality. The Clavister P8 is an extreme powerful firewall solution with a wide range of options to meet the toughest performance targets for telecoms operators and large-scale data centers. Based on µTCA (MicroTCA) platform, it delivers up to 80 Gbps in its base configuration, with capacity up to 240 Gbps in a single 1U 19” rack mount. This makes the Clavister P8 the perfect solution for telecoms operations and large-scale data centers where performance demands are ever increasing.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Powerful and modular

Key Benefits

� Modular, extensible and powerful

� Reliable, world-class design

Clavister P8 Specifications

P8 P8 AMC ModuleFirewall Performance (Gbps) 80 40

VPN Performance (Mbps) 40 10

Concurrent Connections 20 000 000 10 000 000

Concurrent VPN Tunnels (IPsec) 200 000 50 000

Ethernet Interfaces 8 x 10GbE (SFP+) 4 x 10GbE (SFP+)

Management/High Availability Ports 2 x 10GbE (SFP+) 2 x 1GbE (RJ45)

n/a

Virtual Interfaces (VLAN) 2 048 1 024

Virtual Routers 500 250

Clavister OS Clavister cOS Stream

Form Factor 19” Rack Mountable (1U) AMC Module

PolarBearSeries

Clavister P8

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: p8 (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

C

LA

VIS

TE

R P

OL

AR

BE

AR

SE

RIE

S

clavisterPolarBearSeriesClavister P8

Clavister PolarBear Series – highest performance and scalability, smallest footprint

The Clavister PolarBear Series is a set of network security products designed for telecom operators and large-scale data centers requiring high performance, excellent scalability and robust functionality. The Clavister P8 is an extreme powerful firewall solution with a wide range of options to meet the toughest performance targets for telecoms operators and large-scale data centers. Based on µTCA (MicroTCA) platform, it delivers up to 80 Gbps in its base configuration, with capacity up to 240 Gbps in a single 1U 19” rack mount. This makes the Clavister P8 the perfect solution for telecoms operations and large-scale data centers where performance demands are ever increasing.

Key Features

� Massive firewall performance

� Comprehensive connectivity

� Powerful and modular

Key Benefits

� Modular, extensible and powerful

� Reliable, world-class design

Clavister P8 Specifications

P8 P8 AMC ModuleFirewall Performance (Gbps) 80 40

VPN Performance (Mbps) 40 10

Concurrent Connections 20 000 000 10 000 000

Concurrent VPN Tunnels (IPsec) 200 000 50 000

Ethernet Interfaces 8 x 10GbE (SFP+) 4 x 10GbE (SFP+)

Management/High Availability Ports 2 x 10GbE (SFP+) 2 x 1GbE (RJ45)

n/a

Virtual Interfaces (VLAN) 2 048 1 024

Virtual Routers 500 250

Clavister OS Clavister cOS Stream

Form Factor 19” Rack Mountable (1U) AMC Module

Clavister worldwideFounded in 1997, we have a long history of providing network security for some of the most mission-critical networks in the world.

Core valuesSome of the core values we bring to our customers are:

Innovative designNot only do our products look great, our software is also designed to be clear and concise to help administrators get the job done with minimal difficulty.SimplicityEverything we do contributes to making your job easier; from finding the right product, and ordering it to installing, configuring, deploying and operating it. We strive to make your life easier.Extreme performanceThe need for speed is vital in today’s connected world. If your network is congested, your customers are going to complain. We deliver extreme performance.

Copyright © 2012 Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.CID: toc (2012/06)

Clavister AB, Sjögatan 6 J, SE-891 60 Örnsköldsvik, SwedenPhone: +46 (0)660 29 92 00 | www.clavister.com

We’re pleased to welcome you to the latest edition of Clavister Products and Solutions. Here you will find information about us, our solutions and our current product range. We hope this will be an inspiration for you and help you to choose the Clavister solutions that best match your needs.

For a faster, simpler and more secure world,

Peter Johansson, President and CEO Clavister AB

Clavister Products and Solutions ContentsAbout Clavister ............................................................................................................... 3

Solutions overview .......................................................................................................... 4

Cloud solutions ........................................................................................................... 5

Enterprise solutions ..................................................................................................... 6

Telecoms solutions ...................................................................................................... 7

Customer references ...................................................................................................... 8

Our customers ............................................................................................................ 9

Clavister technology ..................................................................................................... 10

Clavister application control ........................................................................................11

Clavister product portfolio ............................................................................................. 13

Clavister W3 .............................................................................................................. 14

Clavister W5 .............................................................................................................. 15

Clavister W7 .............................................................................................................. 16

Clavister W8 .............................................................................................................. 17

Clavister X8 ............................................................................................................... 18

Clavister E7 ............................................................................................................... 19

Clavister V3, V5, V7, V9 .............................................................................................. 20

Clavister P8 ............................................................................................................... 21

Clavister P9 Blade ..................................................................................................... 22

Clavister P9 Chassis .................................................................................................. 23

In conclusion… ............................................................................................................ 24

PR

OD

UC

TS

AN

D S

OL

UT

ION

S

17 18

ComGuard

Page 12: Comguard E-Brochure

PowerBroker Express enables organizations to manage access to any SSH-supported device – routers, firewalls, Windows devices, and more – effectively extending security and compliance controls across the entire IT network infrastructure. PowerBroker Express is a full-featured session monitoring tool, complete with comprehensive logging down to the keystroke level, ensuring that no improper action escapes scrutiny.

Prevent data loss and achieve compliance with PowerBroker DLPLoss of customer account details, exposure of confidential information and theft of sensitive data cost companies up to 5% of revenue every year. Insiders, employees and contractors who have authorized access to confidential data, are responsible for 70% of total data leaks. Protect your most important assets with the simplest, most powerful, and easiest to deploy data protection solution on the market.

Delegate Root Tasks and Authorization in Virtualized Datacenter EnvironmentsPowerBroker Virtualization provides a dedicated solution for delegating root tasks and authorization in virtualized datacenter environments without ever disclosing the highly sensitive root password. The product adapts to the increasing scale and complexity of rapidly changing virtual and cloud environments, allowing for secure and efficient deployment and expansion within any IT infrastructure. PowerBroker Virtualization’s highly flexible policy language enables enterprises to dictate permissions for users down to the most granular level, extending to any command executable on guest operating systems as well as hypervisor hosts

PowerBroker Servers empowers IT organizations with the ability to delegate root tasks and authorization on Linux, UNIX, and Mac OS X platforms without ever disclosing the highly sensitive root password. PowerBroker Servers utilizes highly flexible policy language to enable enterprises to dictate permissions for users down to the most granular level, extending to any command executable on a UNIX, Linux, or Mac OS X server. This capability along with PowerBroker Servers’ audit-ready logging and comprehensive reporting combine to deliver a solution that enables businesses of every size and industry to satisfy critical internal and external compliance requirements.

Effectively Secure Data Assets and Maintain the Integrity of Critical System ConfigurationsSignificantly Reduce the Cost of Compliance.PowerBroker Databases Monitor & Audit helps Director’s of IT, IT Security, and IT compliance address the threat to data security and compliance posed by un-controlled privileged database users. It provides a complete solution by addressing this threat across the privileged credential life cycle including credential discovery, management, fine grained privilege delegation, privileged user activity monitoring, closed loop activity reconciliation, and automated compliance reporting. These capabilities are packaged for rapid deployment of pragmatic data security and compliance solutions making the time to value on a PowerBroker Databases investment very short. PowerBroker Databases Monitor & Audit offers the best economic value in the market today, to ensure the compliance of your heterogeneous DB environment

eEye Digital Security has made vulnerability management simpler and more effective by providing the only unified vulnerability and compliance management solution that integrates assessment, mitigation, and protection into a complete offering. With a proven history of innovation, eEye has consistently been the first to uncover critical vulnerabilities and prevent their exploit. eEye leverages its world-renowned research to create award-winning solutions that strategically secure critical IT assets and the data they hold. Thousands of mid-to-large-size private-sector and government organizations, including some of the most complex IT environments in the world, rely on eEye solutions to protect against the latest known, unknown and zero-day vulnerabilities.

Retina CS enables IT Security professionals to centrally manage organization-wide IT security - physical, virtual, mobile and cloud - from a single, web-based console. It is the only unified vulnerability and compliance management solution that integrates security risk discovery, prioritization, remediation, and reporting, which dramatically decreases the time and effort required to manage IT security.

Retina Network Security Scanner, the industry’s most mature and effective vulnerability scanning technology, identifies known and zero-day vulnerabilities to protect your organization’s valuable assets.

Powered by the Retina Network Security Scanner technology, Retina Community is a FREE vulnerability assessment solution (32 IPs) that enables zero-day identification, and configuration auditing for networked and virtual environments.

Retina Cloud provides cloud-based security and compliance services including external Payment Card Industry (PCI) scans and external vulnerability scans. Retina CS also supports the complete vulnerability management for your private and public cloud assets.

Retina.GOV is an integrated end-to-end vulnerability and compliance management solution designed to help Government departments and agencies with protection and compliancy by defining and monitoring relevant IT controls.

The Retina Web Security Scanner is a best-in-class web scanning solution that rapidly and accurately scans large, complex websites and web applications for vulnerabilities.

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving our customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. Our strength is in protecting infrastructure and data across the entire IT landscape: making every device - whether on a desk or in a data center, in a pocket or a virtual machine, or in the cloud - as secure as possible. Our solutions identify and remediate the vulnerabilities that are the basis for cyber-attacks, as well as mitigate internal threats that arise from the accidental or intentional misuse of system or device privileges. In short, we protect from both the external and internal threat.

Automate Password Management for Increased SecurityPowerBroker Password Safe Meets Compliance Mandates by Auditing and Managing Passwords PowerBroker® Password Safe is an Automated Password Management (APM) solution for access control, manageability and audit of all types of privileged accounts such as shared administrative accounts, application accounts, and local administrative accounts. PowerBroker Password Safe offers complete device support for any operating system, account or device. PowerBroker Password Safe is a critical component of BeyondTrust Privilege Identity Management (PIM) solutions. PowerBroker Password Safe secures access to privileged accounts.

19

ComGuard

20

Page 13: Comguard E-Brochure

HP Enterprise Security Solutions - Delivering Security Intelligence and Risk ManagementHP is radically changing the enterprise security landscape with its Security Intelligence Platform. The HP Security Intelligence Platform uniquely leverages advanced threat research and powerful correlation of security events and vulnerabilities with contextual data to deliver security intelligence spanning IT operations, applications and infrastructure.

Based on market-leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence Platform enables enterprises to take a proactive approach that integrates security correlation, deep application security analysis, and network-level defence mechanisms, all backed by our best-of-breed range of information security services

HP ArcSight Security IntelligenceThe HP ArcSight Security Intelligence platform helps safeguard your business by giving you complete visibility into activity across the IT infrastructure: external threats such as malware and hackers; internal threats such as data breaches and fraud; risks from application flaws and configuration changes; and compliance pressures from failed audits.ArcSight is the industry’s leading security information and event management (SIEM) solution for collecting, analyzing and assessing security events. The result is rapid identification, prioritization and response to cybersecurity attacks and insider threats. Only ArcSight correlates users, logs and NetFlow to understand the who, what and where of information security.

HP ArcSight ESMAutomate Pattern AnalysisProtect Critical Application TransactionsSecure Sensitive Data

HP ArcSight ExpressIntegrate Correlation and Log ManagementAutomate Security OperationsSearch Through Terabytes of Log Data In Seconds

HP ArcSight LoggerStore And Manage All Enterprise Log DataAutomate Compliance ReportingGain Business Intelligence For Logs

HP Fortify Software Security CenterHP Fortify Software Security Center is a suite of tightly integrated solutions for fixing and preventing security vulnerabilities in applications. It eliminates software security risk by ensuring that all business software— whether it is built for the desktop, mobile or cloud—is trustworthy and in compliance with internal and external security mandates. HP Fortify Software Security Center secures all software in the enterprise, regardless of whether it is developed in-house, procured from 3rd party vendors, or running in production. HP Fortify Software Security proactively identifies and eliminates the immediate risk in legacy applications, as well as the introduction of systemic risk during application development. This is done through:

Security testing – identify vulnerabilities throughout the application lifecycle with static, dynamic or integrated application testing.Secure development – automate the management, tracking, remediation, and governance ofenterprise software risk.

HP TippingPointHP TippingPoint provides pro-active network and cloud security to protect against today’s advanced cyber threats. With increased threat sophistication, use of personal mobile devices, new compliance requirements, growth in cloud computing, and the ubiquitous use of recreational applications, security managers now have more risk to manage and more attack surface to defend. HP TippingPoint’s next generation network security solutions provide flexible and modular security for defending your applications, networks and data from today’s advanced persistent threats and high-profile attacks.

Next Generation Intrusion Prevention System (NGIPS)TippingPoint NGIPS delivers an adaptive security Intrusion Prevention System to protect against cyber threats that target applications, networks, and critical data. It can give you new levels of in-line, real-time intrusion protection and proactive network security as your networks and data centers evolve and grow.

Next-Generation Firewall (NGFW)HP TippingPoint Next-Generation Firewall gives you application visibility and control. HP TippingPoint now delivers a new series of next-generation firewalls built with proven network security intelligence. This easy-to-use firewall appliance delivers reliability, high-performance, security effectiveness, and granular application visibility and control, allowing your organization to improve your security posture and harden your network defense.

Security Management System (SMS)The HP TippingPoint Security Management System (SMS) appliance gives you global vision and security policy control for your large-scale deployments of all HP TippingPoint products, including the HP TippingPoint Next Generation Intrusion Prevention Systems (NGIPS), Core Controllers and SSL appliances. It delivers robust management functionality and flexible deployment. Multiple models are available to match your current requirements and provide a growth path

21 22

ComGuard

Damballa is the leading provider of security solutions that protect enterprise, ISP and telecommunication networks against advanced malware, persistent threats, and zero-day targeted attacks. Damballa’s unique approach rapidly identifies the command-and-control infrastructure used by criminal operators to exfiltrate data from assets and devices infected with malware. Our signatureless solutions improve security both inside and outside the network perimeter and stop threats traditional prevention solutions miss. Damballa identifies the severity and intent of these attacks even when the malware evades detection.

For Enterprise NetworksDamballa Failsafe is the leading solution for detecting and terminating persistent threats and targeted attacks in enterprise networks. Damballa Failsafe hunts for hidden infections and undetected threats by monitoring and analyzing egress, proxy and DNS traffic, and detecting and analyzing suspicious file downloads. By correlating suspicious network activity, Damballa Failsafe can pinpoint infected assets while profiling the severity of the threat and providing full forensics regarding threat activity and the criminal operators behind the threat.

For Service Provider NetworksDamballa CSP is protecting some of the largest cable and wireless ISP networks in the world. By monitoring DNS activity to detect infected subscribers, Damballa CSP is a ‘light weight’, highly scalable and powerful solution for identifying network abuse and infected subscribers.

Advanced Threat IntelligenceDamballa FirstAlert is the advanced cyber threat intelligence system that powers the Damballa Failsafe and Damballa CSP offerings. Damballa FirstAlert detects emerging threats long before the rest of the security industry has discovered and analyzed the related malware, and it is based on more than a half a decade of global DNS traffic monitoring and malware analysis, superior machine learning technology, six patents pending and backed by some of the world’s leading authorities in cyber threats and criminal networks

Page 14: Comguard E-Brochure

WildPackets® develops hardware and software solutions that drive network performance, enabling organizations of all sizes to analyze, troubleshoot, optimize, and secure their wired and wireless networks. WildPackets’ technology provides greater real-time visibility into the network, precision expert analysis, and a superior user interface that reduces training costs and speeds problem resolution time. Unique products and excellent customer support have consistently yielded a customer renewal rate greater than 90%. Our solutions and services address converged networks, application performance, virtualization, 802.11n, VoIP, and other enterprise IT challenges. Sold in over 60 countries through a broad network of channel and strategic partners, WildPackets products are deployed in all industrial sectors, including 80% of the Fortune 1000. .

WildPackets® network performance management solutions give network engineers real-time visibility into every part of the network simultaneously from a single interface, including Ethernet, Gigabit (1G), 10 Gigabit (10G), 40 Gigabit (40G), 802.11a/b/g/n wireless, VoIP, and Video links to remote offices.

WildPackets® offers both portable and distributed solutions for monitoring, analyzing, and optimizing enterprise networks and applications. OmniPeek network analyzers perform deep packet inspection, forensics, troubleshooting, and packet and protocol analysis of wired and wireless networks. The OmniPeek console connects to Omnipliance and TimeLine network recorders and OmniEngine software probes to monitor and analyze NetFlow, sFlow, and packet data at remote locations throughout the network. WatchPoint brings the data collection and expert Analysis capabilities of NetFlow, sFlow, and packet data to an entirely new level by offering Web dashboard-style reporting unprecedented visibility network traffic and application performance trends and behavior across the entire enterprise.

With our solutions, IT administrators can:Rapidly resolve network issues in real-time, before they become major problemsOptimize network and application performanceBaseline the entire network to understand the impact of deploying new technologies, such as VoIP or videoMitigate security threatsImprove overall end-user productivity

CIOs and Business Managers can:Easily communicate service level compliance to the organizationAudit and track network activity for HR compliance violationsSee the financial effect of new application deploymentsAllocate IT Capital Expenditure budgets more efficiently

Key Products: WildPackets distributed network analysis solutions give network engineers real-time visibility into every part of the network, and WatchPoint® for enterprise-wide network monitoring and reporting. WildPackets’ distributed network analysis solutions include:

OmniPeek® network analyzer OmniEngine™ software probeOmnipliance® network recorderTimeLine™ network recorder

Entuity is the first network management solution vendor to recognize its importance and deliver a solution for Green IT creating another way to address strategic business processes, reduce costs, and reduce IT environmental impact. Entuity Network Professional Edition (NPE) offers a network management solution for small to medium sized organizations leveraging the enterprise-class engine of Entuity Enterprise.

Entuity is One Product Providing Many SolutionsIT organizations need in-depth infrastructure management to provide:

Resource Management Effective resource management requires an understanding of which devices, systems or links are under or over-utilized. A lack of insight into how resources are utilized can result in either unnecessary investments in additional hardware or result in poor network performance that impacts applications and users.

Capacity Planning and Decision Support Knowing which devices and systems support which applications enables informed decisions about the future of your infrastructure. Historical trend reports provide key indicators to help predict future resource requirements. With the right information in place, the ability to make incremental capacity adjustments is far simpler than guessing with capacity plans made too far in advance.

Compliance and Audit SOX, PCI-DSS, GBLI all require traceability of transactions and protection of corporate and consumer data. Network management provides an essential component of a complete compliance strategy through the ability to maintain current network documentation and inventory. The ability to keep up-to-date documentation is essential for IT organizations to prove compliance and pass audits.

SLA Management Service Level Agreements (SLAs) form the basis of how IT will deliver services and applications to end-users and customers. The reliable delivery of services and positive user experience requires a robust infrastructure that is proactively monitored and measured constantly. Alignment of the network to the business is essential to maintaining consistent service levels

Troubleshooting Preventing outages by detecting faults or anomalous behavior before they become widespread and impacts business continuity is essential. The ability to pinpoint problems sooner and identify root causes faster increases network reliability and focuses your resources on the problem more efficiently.

Cloud Monitoring Regardless of where your applications and infrastructure are hosted, the network will continue to provide critical connectivity to drive business productivity and profitability.

Green IT Initiatives Tangible reductions in operational costs and increased resource utilization are now possible through Green IT initiatives. Reductions in data center footprints, power consumption and cooling requirements all contribute to cost savings and decreasing an organization’s energy footprint. It is possible to generate ever further savings by monitoring device power ratings, server efficiency and establishing corporate shutdown policies.

23 24

ComGuard ComGuard

Page 15: Comguard E-Brochure

25 26

Courion Corporation is the leader in identity and access management (IAM) solutions that effectively and securely manage user access risk. More than 14 million users in 500 organizations worldwide rely on Courion’s access risk management solutions to align user access privileges with corporate and regulatory governance policies. Courion solutions enable organizations to quickly identify, quantify and manage access risks to vital information such as intellectual property, medical records, personally identifiable information and customer data, while demonstrating compliance with regulatory requirements. Courion’s cloud and on-premise solutions offer full arrays of IAM functions such as: identity and access governance, user provisioning and password management, in affordable packages that deliver faster time to value than other industry solutions.

Access Insight™

Powered by an underlying access intelligence engine, Access Insight identifies associations and patterns in user access privileges that might violate compliance guidelines of company policies. The structure of the product’s access intelligence cube helps organizations create near-real-time graphical profiles of the most critical security risks to information — replacing manual data sorting and risk scoring that lacks context, and a connection to business priorities.

ComplianceCourier™

Courion’s access certification and compliance management solution provides organizations with the ability to automate the verification and remediation of access rights. It extends the responsibility and accountability for compliance to the most appropriate resources, enabling business users to monitor and enforce access to sensitive data and other vital corporate assets. Powerful analysis tools provide a visually rich interface that makes it simple to monitor compliance and reduce enterprise risk.

RoleCourier®

Courion’s role lifecycle management solution automates role creation and ongoing role management, enabling organizations to effectively align business roles with IT accounts and access rights. This access governance tool employs a unique hybrid approach combining “top-down” role design and “bottom-up” role mining to create a platform for robust long-term role lifecycle management that easily adapts to today’s changing business environment.

Compliance Manager for File SharesCompliance Manager for File Shares is Courion’s complete solution for ensuring that user access to file shares is aligned with corporate security policies and industry regulations -- allowing organizations to identify the riskiest file share assets in their organization, enabling them to focus efforts on the areas where they can have the greatest impact on reducing risk.

AccountCourier®

Courion’s user provisioning solution enables enterprises to fully automate new hire, promotion/transfer and termination processes. With its flexible workflow engine and ability to connect to multiple authoritative sources, Account Courier provides a common access management environment for both IT accounts and physical assets.

Access Request ManagerCourion’s Access Request Manager is a streamlined access request interface that makes it simple for authorized users to request access for themselves and others. Access Request Manager provides an easy-to-follow, guided format for presenting access rights that you define for users in your organization.

PasswordCourier®

Courion’s password management solution enforces consistently strong password policies and enables users to instantly and securely reset their own passwords on enterprise systems, applications and Web portals. Transparent synchronization lets users use one password to access multiple systems, improving convenience, enhancing security and increasing adoption. Multiple self-service entry points are available, such as Web, desktop PC, voice authentication, IVR or via support staff.

Key StatisticsPublicly traded: XXIA (Nasdaq) Founded in May 1997 IPO in October 2000 Launched first 10GE testing solution in Q1, 2001 Complete layer 2-7 solution in 2001 Delivered world’s first 100GE test system in 2008 Delivered world’s first 40GE test system in 2009 Acquired wireless test company Catapult Communications in June 2009 Acquired Agilent’s N2X IP test division in October 2009 Acquired Wi-Fi test company VeriWave in July 2011 Acquired leading network visibility provider Anue Systems in June 2012 Acquired actionable security intelligence (ASI) pioneer BreakingPoint in August 2012

Technologies Solution LeaderWireless, 4G/LTE, and Wi-Fi devices and systems - provides large-scale handset emulation and realistic subscriber modeling to test the performance of nextgeneration access and core devices; verifies performance and security of Wi-Fi networks and devices: Wi-Fi AP and LAN controllers, client devices, residential gateways and routers, and Ethernet switches and branch office routers. Virtualization and Cloud Computing -validates virtualized infrastructure performance and security. Security - preemptively tests the performance, security, and stability of network and security products using actionable security intelligence (ASI). Traffic Visibility - provides traffic visibility and monitoring for production networks, to quickly connect diagnostic troubleshooting products without having to disconnect other monitoring tools from the network Higher Speed Ethernet - verifies service delivery over 40 and 100Gbps links with first-to-market test solutions. Data Center Optimization - Ethernet/Fibre Channel interfaces and protocols to test converged data center networks

Ixia’s Powerful and Versatile Network Test and Visibility Solutions:IxNetwork/IxN2X - tests IP routing and switching devices and broadband access equipment. Provides traffic generation and emulation for the full range of protocols: routing, MPLS, layer 2/3 VPNs, Carrier Ethernet, broadband access, and data center bridging. IxLoad - quickly and accurately models high-volume video, data, and voice subscribers and servers to test real-world performance of multiservice delivery and security platforms. IxCatapult - emulates a broad range of wireless access and core protocols to test wireless components and systems. When combined with IxLoad, provides an endto- end solution for testing wireless service quality. IxVeriWave - employs a client-centric model to test Wi-Fi and wireless LAN networks by generating repeatable large-scale, real-world test scenarios that are virtually impossible to create by any other means. BreakingPoint Security - provides global visibility into emerging threats and actionable insight that can be used to harden and maintain resilient networks and data centers. Anue Net Tool Optimizer™ (NTO) - achieves complete network visibility with the easiest drag-and-drop control panel in the industry. Test Automation - provides simple, comprehensive lab automation to help test engineering teams create, organize, catalog, and schedule execution of tests. Innovative Hardware - employs chassis and load modules that enable plug-and-play configuration of technologyspecific protocols, interfaces, performance, impairment, and load density for 1/10/40/100GE, ATM-POS, and Fibre Channel networks.

Deliver On

Ixia’s award-winning solutions are used worldwide by network equipment manufacturers, service providers, enterprises, and governments to:

Assess and optimize network performance, validate compliance, and harden security. Gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. Harden mission-critical networks against attack and train personnel to recognize and eradicate vulnerabilities. Improve performance, security, and application delivery of cloud, data center, and network services.

ComGuard ComGuard

Page 16: Comguard E-Brochure

27 28

BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery.Enterprises and government agencies worldwide trust BlueCat to manage millions of devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization and cloud automation. Our innovative solutions and expertise enable organizations to build a network infrastructure that is more scalable, reliable and secure, as well as simplify the transition to next-generation technologies including IPv6, DNSSEC, M2M and SDN.

Bluecat DNS/DHCP ServerBlueCat DNS/DHCP Server delivers rock-solid DNS and DHCP for your network. When DNS and DHCP core services fail, business stops – Web sites are unreachable, network-dependent applications including e-mail, ERP, CRM and VoIP cannot function and users cannot find virtual machines or cloud services. Purpose-built to deliver the highest levels of performance, scalability, security and availability, BlueCat DNS/DHCP Server meets the business-critical DNS and DHCP needs of any organization to ensure always-on business connectivity.

BluecatAddress Management (IPAM)BlueCat Address Manager is a powerful IP Address Management (IPAM) solution that lets you take control of your complex and dynamic network. With integrated core services, workflow and automation, BlueCat Address Manager enables you to centrally manage every connected device on your network from a single pane of glass. BlueCat Address Manager provides network intelligence and insight into the relationship between devices, users and IP addresses that can be put into action to improve security and ensure reliable, always-on business connectivity.

Bluecat Automation ManagerBusiness users now demand immediate response for everyday IT requests. BlueCat Automation Manager allows you to instantaneously complete critical network requests by automating end-to-end IPAM processes and workflow. With BlueCat Automation Manager, you can empower users to request IT changes via a simple self-service portal and dramatically reduce turnaround times for completing those requests. Flexible and extensible, BlueCat Automation Manager can be tailored to your existing systems and processes to deliver immediate value with no staff retraining required.

Delphix Transforms Enterprise Application DeliveryOrganizations spend enormous amounts of time and money to build and support applications that run on databases. Approving, creating and updating copies of databases for application development, troubleshooting, and analysis requires weeks of time and millions of dollars of capital and operating expense. As a result, IT often cannot keep up with business demands for application additions and timely data.Delphix enables agile data management through intelligent software that eliminates redundant infrastructure and slow processes. As a result, Delphix customers deliver better business applications more quickly and at lower cost. The Delphix team has created successful software companies in a variety of markets, including data de-duplication, virtualization, application development, and real-time intelligence and analysis. The Delphix Agile Data Platform is being used today by leading global organizations to cut the time, cost, and complexity of delivering enterprise applications.

R

WinMagic is a leading provider in full-disk encryption solutions. Its SecureDoc line of products ensures protection of sensitive information stored on desktops, laptops, tablet and servers by various means of authentication that range from passwords to hardware tokens, biometrics and PKI. WinMagic’s award winning products fulfill the requirements of even the most security conscious organizations by focusing on concrete security features while offering a zero impact user experience and ensuring maximum security and transparency in regular workflow. Fast & flexible deployment and comprehensive security allows you to streamline IT processes and as a result reduces the total cost of IT network ownership.

WinMagic’s SecureDoc Enterprise Edition maintains end user productivity while ensuring maximum security and transparency in regular work flow. Easily integrating with industry-standard technologies such as OPAL-compliant, Self-Encrypting Drives (SEDs), SecureDoc enables organizations to meet internal requirements and government or other regulations to maintain the security and integrity of their data.

WinMagic’s best of breed encryption solutions provide unparalleled data protection across all platforms from a single management console while offering a broad variety of device choices for your employees to use.

Features & Benefits

Scalability & FlexibilityConvenient, robust, easy to use and provides more flexibility to IT managers to manage SES

Reduced cost of Ownership SecureDoc’s compelling features can help easily manage your BYOD or traditional IT environment and can help you realize quick and tangible savings on your TCO, all the while keeping your data highly secure. With industry-leading full disk encryption technology and industry-first technology like PBConnex™, SES enables customers to streamline their IT processes and as a result, help reduce the total IT cost of ownership.

Single ‘pane of glass’ configuration and managementSES places all security-related management under one centralized enterprise server, including policies, password rules, and the manageability of encryption across PC, Mac and Linux platforms alike.

Working with complimenting technologiesEasily integrating with industry-standard technologies such as OPAL-compliant Self-Encrypting Drives (SEDs) and Intel® Anti-Theft Technology.

Extended features set beyondPBConnex, SED management, Removable Media Encryption (RMCE) and File and Folder Encryption

PCI CompliantAudit capability to prove encryption/compliance

Password recovery/helpdesk capabilitySelf-help and help desk capabilities for lost / forgotten passwords, tokens, etc.

Certifications include: FIPS 140-2, Common Criteria EAL4, BITS, AES validation, The National Security Agency (NSA) (SECRET level), National Institute of Standards and Technology (NIST) Certificate #1

ComGuard ComGuard

Page 17: Comguard E-Brochure

29 30

ComGuard ComGuard

Array Networks is a global leader in application delivery networking with over 5000 worldwide customer deployments. Powered by award-winning SpeedCore™ software, Array solutions are recognized by leading enterprise, service provider and public sector organizations for unmatched performance and total value of ownership. Array is headquartered in Silicon Valley, is backed by over 300 employees worldwide and is a profitable company with strong investors, management and revenue growth. Poised to capitalize on explosive growth in the areas of mobile and cloud computing, analysts and thought leaders including Deloitte, Red Herring and Frost & Sullivan have recognized Array Networks for its technical innovation, operational excellence and market opportunity.

APV Series Application Delivery ControllersAPV Series Application Delivery Controllers improve the availability, performance and security of applications and IP data services while increasing server efficiency and reducing cost and complexity in the data center. APV integrates SSL acceleration with Layer 2-7 load balancing, acceleration, Web application security and a rich ADC feature set to improve efficiency and performance for delivering secured applications.

AG Series Secure Access GatewaysArray Networks AG Series Secure Access Gateways provide scalable, mobile-ready secure access to enterprise and cloud applications for any user, anywhere on any device – protecting data while enabling true anywhere-to-anywhere connectivity. Also provides centralize control over access to business critical resources, providing security for data in motion and at rest and enforcing application level policies on a per user basis.

aCelera WAN Optimization ControllersArray’s aCelera physical and virtual WAN optimization controllers dramatically reduce application response times over wide area networks by reducing the amount of traffic that goes over the network between remote offices and data centers. Where scalability and performance across WANs are critical factors, aCelera physical appliances reduce response times for enterprise applications by more than 95% by mitigating the effects of limited bandwidth, high latency, packet loss and network congestion.

AirTight Networks is the global leader in WIPS (Wireless Intrusion Prevention System) and secure Wi-Fi solutions. The company’s award winning family of products and cloud services brings together a true carrier-class multitenant cloud architecture, breakthroughs in Wi-Fi analytics, manageability, ease-of-deployment and cost-effectiveness, as well as AirTight’s longtime top-rated WIPS technology.

Wireless Intrusion Prevention System (WIPS)Without the right tools to understand what is happening in your airspace, your business is exposed. Misconfigured access points, a rogue (unauthorized) access point, an employee connecting to a neighbor’s network or a hacker sitting in your parking lot - all these can open a back door into your enterprise network and compromise your data. AirTight WIPS (formerly SpectraGuard Enterprise) is consistently recognized as the industry’s top rated wireless IPS solution and is the solution of choice for security conscious organizations.

Wireless LAN Solutions for the EnterpriseAirTight Wi-Fi provides all the enterprise WLAN features including content filtering, firewall, QoS, admission control, traffic shaping, and BYOD device onboarding. AirTight has a family of custom-engineered, software configurable Wi-Fi APs, including its C60 platform that is dual-radio, dual concurrent, and industry’s only that can deliver 3x3:3 performance on 802.3af power budget and can also provide dedicated 24/7 WIPS protection concurrent with 802.11n access.

Secure Cloud WiFi ServiceThe AirTight cloud can scale for ten to tens of thousands of locations or devices. It is multi-tenant – separating customer accounts, configuration, and data. In fact, AirTight is the first and only cloud based Wi-Fi and WIPS vendor that can also enable multi-tenancy within a specific customer account (e.g., corporate vs. franchisee, or across multiple brands) using AirTight’s patented hierarchical location based architecture.

Ping Identity sells a security system that grants users access to different applications via one password and login page. Boeing, Aflac and Shell are customers. CEO Durand previously founded Jabber Inc., an open-source instant messaging company that sold to Cisco in 2008. Ping has raised $21 million in venture funding from Volition Capital, Draper Fisher Jurvetson and others in June 2011.

Ping Identity’s rapidly deployable Internet-identity security platform for browser-based single sign-on (SSO), identity-enabled Web Services, and associated user-account management. Using standards-based identity federation, PingFederate provides an organization’s network users with secure access to Web applications or other Internet resources across domains, without the need for repeated logons. PingFederate thus eliminates the proliferation of passwords and reduces the operational overhead associated with managing multiple user accounts. For organizations needing secure SSO to Software-as-a-Service (SaaS) providers, PingFederate also offers optional connection templates and automated user provisioning for selected SaaS applications (including Salesforce and GoogleApps). This option allows you to leverage existing identity-management investments—thus eliminating the need to replicate and expose any confidential user data over the Internet.

Audit your website security with Acunetix Web Security ScannerWebsite security is possibly today’s most overlooked aspect of securing the enterprise and should be a priority in any organization. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases.

Firewalls, SSL and locked-down servers are futile against web application hackingAny defense at network security level will provide no protection against web application attacks since they are launched on port 80 - which has to remain open. In addition, web applications are often tailor-made therefore tested less than off-the-shelf software and are more likely to have undiscovered vulnerabilities. Acunetix WVS automatically checks your web applications for SQL Injection, XSS & other web vulnerabilities.

Acunetix Web Vulnerability Scanner is an industry leading web vulnerability scanner that scans websites and web applications for a large variety of vulnerabilities. Network-level defense mechanisms such as firewalls, SSL and properly configured servers provide no protection against web application attacks. This is because web application attacks are performed on port 80 or port 443, which are the ports that need to remain open. Additionally, since web applications are often tailor-made to serve specific business requirements, testing for vulnerabilities tends to be less rigorous than off-the-shelf software.

Acunetix Web Vulnerability Scanner is able to automate and significantly speed-up the penetration testing process by subjecting web applications to several hundreds of different attack vectors for attacks such as SQL Injection, Cross-Site Scripting and Cross-Site Request Forgery. Any vulnerabilities found are reported and accompanied by information detailing the impact of the vulnerability and how to fix them.

Page 18: Comguard E-Brochure

31 32

ComGuard ComGuard

IT Security Professional CertificationsThe International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various information security and e-business skills. EC-Council has been certified by American National Standards Institute to meet its ANSI 17024 standard. CSCU, EC-Council Basic Computer Security Framework for Enterprise End Users is based on a comprehensive analysis of fundamental information security job roles and critical information security controls. The framework encompasses the established standard, guidelines and frameworks available for computer security from an end user perspective. CSCU completely maps to EC-Council Basic Computer Security Framework for Enterprise End Users.It is the owner and creator of the world famous Certified Ethical Hacker (CEH), EC-Council Secure Programmer.Net (ECSP.NET), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 87 countries through a training network of more than 450 training partners globally.

As of January 1st, 2012 EC-Council has trained over 120,000 individuals and certified more than 50,000 security professionals. Many of these certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). And the United States Department of Defense has included the CEH program into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP)

Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations. EC-Council has also been featured in internationally acclaimed publications and media including Fox Business News, CNN, The Herald Tribune, The Wall Street Journal, The Gazette and The Economic Times as well as in online publications such as the ABC News, USA Today, The Christian Science Monitor, Boston and Gulf News.

EC-Council is the owner of the Hacker Halted conference and workshop series, which had been organized in international cities such as Miami, Myrtle Beach, Dubai, Singapore, Kuala Lumpur, Mexico City, among others. Hacker Halted features renowned international speakers who are experts in the field of information security. The objective of Hacker Halted conference series is to raise international awareness towards increased education and ethics in information security.The EC-Council University, based in the state of New Mexico, United States of America, is a fully licensed degree granting university that offers both bachelors and masters degree programs.

Currently, EC-Council is supporting the International Multilateral Partnership against Cyber Threats (IMPACT) that is a partner organization of the United Nations/International Telecommunication Union (UN/ITU) to provide training and technical support to governments of its 191 member states.

Hardware-based detection and removal of viruses, spyware, trojans, rootkits, and more that cannot be removed with software security products.Runs from a USB device and doesn’t install software so it won’t slow down your PC or interfere with your work and play.Rapid reaction to new and emerging threats with intelligent scanning that uses 3 unique scanners from Kaspersky Labs, Sophos, and VIPRE.Not a replacement for antivirus programs, which protect PCs from infections, the FixMeStick is for removing infections that get past the antivirus.Updates are automatically downloaded and stored on the FixMeStick.

External hardware-based removal of viruses, spyware, trojans, rootkits and more that cannot be removed by software security programs

VIRUS REMOVAL DEVICE

The FixMeStick $59.99 MSRP

FixMeStick® Technologies. All rights reserved. FixMeStick and the FixMeStick logo are trademarks of FixMeStick Technologies.All other trademarks are trademarks of their respective owners. Questions? 1-888-530-6125 or visit us at www.FixMeStick.com

© Copyright FixMeStick Technologies, Suite #210, 376 Victoria Ave, Montreal, QC, H3Z 1C3, Canada

FMS9ZAFSTD

• Hardware-based detection and removal of viruses, spyware,trojans, rootkits, and more that cannot be removed withsoftware security products.

• Runs from a USB device and doesn’t install software so itwon’t slow down your PC or interfere with your work and play.

• Rapid reaction to new and emerging threats with intelligentscanning that uses 3 unique scanners from Kaspersky Labs,Sophos, and VIPRE.

• Not a replacement for antivirus programs, which protect PCsfrom infections, the FixMeStick is for removing infections thatget past the antivirus.

• Updates are automatically downloaded and stored on theFixMeStick.

• Valid for one year from the date of first use. Rechargesavailable at www.FixMeStick.com.

Externalhardware-based removal ofviruses, spyware, trojans,rootkits and more thatcannot be removed bysoftware security programs

®

VIRUS REMOVAL DEVICE

“EXCELLENT”

NSFOCUS Information Technology Co., Ltd.is one of the first high-tech companies in China dedicated to network security. Our global presence allows us to deliver timely and effective services to our customers, regardless of where they’re located. NSFOCUS has built and maintains an exhaustive database of threats, vulnerabilities, and other malware that is recognized as a standard throughout the industry. NSFOCUS also does in-depth research in fields such as intrusion prevention techniques, anomaly traffic detection, analysis and sanitization, operating system and application security, security vulnerability detection techniques, security product bugs and detection, as well as worm and virus prevention.

NSFOCUS ANTI-DDos SYSTEMToday’s DDoS attacks are more virulent, more destructive, and more focused than ever. They can easily elude and overwhelm most common defenses. Composed of legitimate-appearing requests, spoofed identities, etc., these highly sophisticated attacks make it virtually impossible to identify and block. DDoS attacks paralyze their targets, prevent them from conducting business, and cost companies billions of dollars in lost revenue every year.

Consistent with its position as a global leader in active perimeter security, NSFOCUS’s Anti-DDoS System (ADS) is designed to defend everyone from small to medium-sized enterprises all the way up to carrier-class providers against damaging DDoS attacks. Not only does the ADS defend, but cleans the traffic to allow critical business functions to continue, keeping your business running, even under the most determined of attacks.

Equipped with a purpose-built operating system and integrating advanced anomaly recognition, source verification, and anti-spoofing technologies, NSFOCUS’s ADS delivers robust and comprehensive anti-DDoS protection to businesses of all sizes.

Page 19: Comguard E-Brochure

Comguard wireless provides wireless network infrastructure, that includes installations, sales, engineering and project management for the deployment of network systems.We provide training on the use of the systems as well as post installation support. These networks may include, but are not limited to microwave point to point systems, WiMax systems, WiFi, Mesh systems and point to multi-point systemsWith new technologies and solutions driving the pace of change of businesses in the region, the competitive edge increasingly comes from exploiting new opportunities in technology before competitors. In this competitive environment, Comguard has been able to build a successful business quickly by drawing on the best of global solutions. Uniquely in the region, this combination of full support for channel partners and market-leading products for emerging technologies provides both partners and their customers with the full confidence to invest in integrated next-generation IT and networking solutions from Rich media communications to security to bandwidth management that will benefit their businesses.

SOLUTIONS Complete range of IT – Network, Wireless & Communication solutions for Point-to-Point and Point-to-Multipoint Wireless Connectivity and further related. Carrier-Class Free Space Optics (FSO), Broadband OFDM Radios, WiFi Hotspots, Millimeter Wave, Licensed Microwave, License Exempted RF, Wimax plus complete solutions for Wireless Area Networks and beyond.

Our product portfolio caters to:Pre-WiMax Broadband OFDM RadiosWiFi APs, CPEs, WDSIntegrated WiFi HotspotsMillimeter Wave Radios (MMW)Licensed Microwave Radios(MW)802.16 WiMAX PlatformFree Space Optics (FSO, Optical Wireless)Network Management Systems

BUSINESS SCOPE1. Broadband & Telecom operators

Carrier ethernet IP network|wimax bakhaul| cellular backhaul| ISP & WISP| broadband internet access

Wireless ISP solutionsWiMAX backhaulCellular & mobile network backhaulCarry mixed IP/TDM traffic, or migrate to 100% IPOffer IP and Ethernet services (video, VoIP, gaming)Extend network reach, expand footprintAdd failsafe redundancy to critical linksLast mile fiber extensionWi-Fi network backhaul servicesBackup your current wireline network for failsafe operationOffer high-speed Broadband Internet AccessOffer business-class Ethernet services Private Networks

Deliverables:Un – paralleled high bandwidth adv.Longer distance backhaulsLeased Line E1/T1 ReplacementPrivate and Enterprise NetworksLast mile fiber extensionsFlexible DeploymentSpectral EfficiencyExtended ReachEco FriendlyNetwork Intelligence and Protection

2. Private NetworksEnterprise Wireless Business Network Applications| leased line replacement| wireless WAN outdoor Network| utility, Energy & Gas

Deliver Broadband Internet AccessLeased Line Replacement - eliminate costly telecom costsInter-building LAN extensionWireless LAN / WAN / MANIncrease network capacity and reliabilityAdd redundancy to critical communication linksCentralize servers, data storage and backupRemote video surveillance monitoring, video conferencingMulti-location voice-over-IP (VoIP)Connect remote buildings/networks that are miles apartTelemedicine and distance learning

3. Public Safety & Security networksGovernment& Municipality network | Security Surveillance System | IP & Ethernet video |analog wireless video transmission

Replace Leased Access LinesPublic Wi-Fi Hotspot Connectivity/BackhaulBandwidth Upgrades for Existing NetworksCitywide IP Video SurveillanceMetro-scale Public Safety NetworksMulti-site/Building LAN InterconnectionMilitary Installation Perimeter SecuritySecure Wireless WAN / Wireless MANMulti-Location Voice-over-IPTraffic Enforcement/SurveillancePort/Harbor/Airport Security MonitoringCampus/Complex Security Monitoring

Cambium Networks’ Point to Point (PTP) radio solutions are providing award-winning network performance in licensed, unlicensed and defined use frequency bands. These include specific FIPS 140-2 solutions for the U.S. Federal market.

Point to Point Overview Cambium Networks’ Point to Point (PTP) radio solutions are providing award-winning network performance in licensed, unlicensed and defined use frequency bands. These include specific FIPS 140-2 solutions for the U.S. Federal market.Based on breakthrough Orthogonal Frequency Division Multiplexing (OFDM) technology, Cambium Networks’ PTP solutions deliver exceptional near-line-of-sight (nLOS) and non-line-of-sight (NLOS) coverage in locations where foliage, tall buildings or other obstructions limit wireless broadband access.Our PTP solutions are ruggedized for 99.999% reliability to deliver exceptional performance at the most extreme temperatures and under the most difficult weather conditions. Our PTP networks deliver the speeds to support today’s in-demand bandwidth-intensive solutions, including high-speed residential and business access, streaming video and VoIP.

Point to MultiPoint overviewCanopy wireless broadband access networks deliver the high-speed Internet access, video surveillance, SCADA, streaming video and VoIP applications. These carrier grade last mile solutions provide wireless access connectivity to build fiber, cable and DSL network extensions to reach underserved areas, or expand business networks. Solutions are also used for SCADA and smart grid applications, 3G offload or other broadband communications.Canopy access networks operate in the licensed, unlicensed and federal frequency bands, providing superior performance in a wide variety of spectrums, including 900 MHz, 2.4, 3.5, 3.6, 4.9, 5.1, 5.2, 5.4, 5.7 and 5.9 GHz. With their simple, elegant design and flexible configuration options, our PMP networks lead the marketplace in speed and ease of installation, reducing both cost and time-to-market and ensuring high performance at an exceptionally low cost of ownership.

EnGenius is the pioneer of Long Range high power wireless solution provider in the telecommunication industry. Stability, sensitivity and penetration capability are our key success factors and competitive edge in achieving customer satisfaction. As a leader of wireless technology, EnGenius stays ahead of the trends and promises to provide high quality products and services to its customers globally. Get connected, get EnGenius.

WISP/Enterprise Outdoor Dual Concurrent AP Outdoor AP/Bridge

SMB Business AP/Bridge

Home / SOHO HOME/SOHO Gateway 3G Router Media Bridge/ Repeater Wireless Adapter

Network Accessories POE Adapaters Antenna Connectors Splitters

Cambium PTP 600 Series

Canopy PMP 450

33 34

Wireless Wireless

Page 20: Comguard E-Brochure

With Wi-Fi from Meru, organizations can:Deal with increasing capacity demands brought on by the Bring-Your-Own-Device (BYOD) phenomenonMeet the increasing wireless demand for bandwidth in support of voice and video applicationsDeploy and manage their wireless network easilyDeliver consistent, high-quality mobile services, so network users can work productivelyManage the network infrastructure efficiently and cost-effectively

The Altai Super WiFi Solution is designed to offer a cost-effective wireless solution for different applications such as 3G/LTE Data Offload, Wireless Broadband, Hotel, University, Container Port, Video Surveillance. Altai’s longer reach Super WiFi technology requires significantly fewer units per square kilometer of coverage with savings of more than 65% and improved latency over conventional mesh systems, making Altai Super WiFi an ideal solution for service providers.

A8 Base Stations Series

A8n Base Station Series

A2 Dual AP Series

C1 CPE Client Series

Meru Networks provides a virtualized wireless LAN solution that optimizes the enterprise network to deliver the performance, reliability, and operational simplicity of a wired network, with the advantages of mobility.Meru’s innovative approach to wireless networking uses virtualization technology to create an intelligent and self-monitoring wireless network. Additionally, Meru uniquely can support “context-aware application layers” (CALs), which provide isolated and secure channels dedicated to specific applications. With Meru, enterprises can become all wireless, smoothly migrating their business-critical applications from wired to wireless networks.

Ensure business applications run reliably over the network, delivering predictable accessProvide secure access for all users and guests

Meru’s enterprise wireless LAN solutions have been adopted in all major industry vertical markets, including Fortune 500 enterprises, healthcare, education, hospitality, retail, manufacturing, and government. Founded in 2002, Meru is headquartered in Sunnyvale, California, and has operations in the Americas, Europe, the Middle East, and Asia Pacific.

Airlive designs, manufacturers, and sells innovative broadband wireless solutions worldwide. The company’s products include disruptive outdoor wireless products which combine industry leading product design built around internally developed core technologies As a company which thrives on innovation and the understanding of customer needs, our products deliver on the price/performance metrics carriers require to build stronger, faster, and smarter wireless networks.

U1 USB CPE series AWMS

4ipnet is a leading provider of networking total solutions for wireless and wired Connectivity, Management, Security, Mobility and Services. It delivers complete diverse array of innovative, turnkey and high-performance products and solutions, to bring reliability and manageability to evolving complex wired and wireless networking and telecommunication world.4ipnet’s complete wireless networking infrastructure and management solution portfolio addresses the needs of different network operation environments ranging from the hospitality, education, telecom 3G-offload, ISP, industrial, medical, SMB, to the SOHO, with an emphasis on providing centralized network management, simplified network deployment, and enhanced network security and performance.

35 36

Wireless Wireless

Page 21: Comguard E-Brochure

ComGuard

37 38

ComGuard

ComGuard

ComGuard

ComGuard

Page 22: Comguard E-Brochure