1~12 item / All 12 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~12 item / All 12 items
The SwiftWing Sirius NDR is a packet capture device capable of capturing up to 8 channels simultaneously at multi-rates of up to 100GbE. The capture interfaces currently support 10M to 10Gbps and 10G to 100Gbps. It can be configured with up to 16 ports (10/25G). Additionally, we offer a flexible storage configuration that supports capture speeds exceeding 20Gbps to 200Gbps. This product provides an optimal system configuration tailored to each user. We customize the capture cards and storage performance and capacity according to the usage environment and required features. Changes can also be made after purchase. 【Features】 - Simultaneous capture settings and execution for up to 8 channels - Customizable port settings for each channel - Permission allocation on a channel basis, allowing one chassis to operate as multiple independent capture systems - Replay of PCAP files up to 500GB - Pre-filter/Post-filter (any values within IP addresses/protocol headers of each layer/application payload, etc.) *For more details, please refer to the website below or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationMetaDefender OT Security is an industrial security appliance that enables the visualization of devices within your current OT environment and centralized security management by implementing it in your OT network. It allows for the rapid detection of devices within the network and enables monitoring and response to threats and anomalies through continuous surveillance. 【Features】 ◼ Continuous monitoring and centralized security management of assets in a distributed network ◼ Designed for OT personnel, making it easy to implement and use ◼ Centralized execution and understanding of network security and compliance operations ◼ Flexible expansion of management targets from specific areas within the network to company-wide scope ◼ Centralized patch management ◼ Comprehensive and customizable dashboard ◼ Real-time analysis engine using AI ◼ Seamless integration with MetaDefender Industrial Firewall (see specifications section) *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationMetaDefender Media Firewall is a product that, when used in conjunction with MetaDefender Kiosk, supports the detection and blocking of dangerous files within removable media, thereby providing protection for systems against the risks of cyber attacks. By implementing the Media Firewall, it becomes possible to more robustly and effectively reduce the risk of cyber attacks attempting to infiltrate host systems via removable media supported by the Kiosk. 【Features】 ◼ Ensures that the media has been scanned by MetaDefender Kiosk ◼ Compatible with common removable media such as USB-A, USB-C, SD, microSD, and CF ◼ No software installation required on the host computer or SCADA ◼ Can be used immediately with a wired connection ◼ Supports both local management (using the host system) and remote management (via Ethernet, using myOPSWAT) *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOPSWAT MetaDefender Kiosk is an appliance product that operates on Windows/Linux OS. This product offers advanced security, high performance, and easy maintenance. Deployment is also simple due to automated licensing and configuration settings. Additionally, OPSWAT's integrated management tool allows for the bulk management of multiple kiosks from a cloud, hybrid cloud, or on-premises UI. 【Features】 ◼ Supports over 20 media types including USB, SD cards, and CD drives ◼ Supports multiple file systems and virtual disks ◼ Media verification agent ◼ Ensures complete erasure of media data imported into the kiosk during scanning *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationMetaDefender Drive is a product that inspects devices brought into a network environment to ensure they do not contain threats such as malware, protecting the network system from the risk of cyber attacks. By conducting inspections just before bringing in devices using this product, it is possible to significantly reduce the risk of exposing critical systems and information to the threats of cyber attacks. It is a very compact and lightweight product, making it easy to carry. 【Features】 ◼ A series that supports scanning devices with displays, such as laptops, and a series that supports scanning devices without displays, such as servers. ◼ No software installation is required on the devices being inspected. ◼ Can be used immediately via a wired connection through a USB port. ◼ Inspections can be flexibly customized, such as scanning only specific file paths. ◼ Settings and reports can be centrally managed alongside other OPSWAT products. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Garrison ULTRA" is a web browser isolation product that creates a more robust web browsing environment by being implemented on user PCs. Using dedicated hardware for browser isolation, it converts web code into pixels and allows browsing of the transformed data on the user's device. Even if harmful content is included within a web page, the system is configured to monitor the content opened within the hardware, preventing the user PC itself from becoming a victim of harmful content. 【Target】 Garrison ULTRA is recommended for customers specifically looking for the following security-related measures: ◼ Protection for privileged users and high-risk users ◼ Safe internet access ◼ Prevention of ransomware ◼ Access to blocked pages ◼ Phishing countermeasures *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "MetaDefender Industrial Firewall" is a dedicated industrial security device equipped with an Intrusion Prevention System (IPS) that protects industrial IoT (IIoT) from cyber attacks. It allows for easy installation and expansion, enabling the rapid protection of network-connected devices in OT/ICS environments. It can simultaneously monitor multiple industrial devices such as PLCs, executing learned normal operational commands in a factory environment and real-time elimination of threats to OT assets that differ from the learned commands. 【Features】 ■ Installation can be done with minimal changes to the industrial network configuration ■ Communication permission settings can specify IP addresses, protocols, and port numbers ■ All unauthorized communications to protected devices are uniformly blocked ■ Communication behavior to blocked protected devices is displayed in a list ■ The protection status of devices can be directly displayed on the HMI *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn benchmark tests conducted by a third-party organization, Invicti was the solution that detected all vulnerabilities. It is also one of the two scanners that did not report any false positives. These results further demonstrate that Invicti possesses advanced and accurate crawling and scanning technology, boasting a high web vulnerability detection rate. [Overview] ■Detected all vulnerabilities *For more details, please refer to the related links or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Invicti" is a web vulnerability scanner that automatically detects vulnerabilities by setting up the target website and starting the scan. By utilizing the scheduling feature, it is also possible to configure regular scan executions. The vulnerabilities detected in the scan are displayed in a list categorized by their severity, and reports can be generated in formats compliant with various compliance requirements. 【Features】 ■ Centralized management of detected vulnerabilities and confirmation of results regardless of time and place, as well as re-testing after vulnerability remediation. ■ Detection and scanning of applications, services, and technologies used within the website, and identification of areas that require protection. ■ Scheduling feature that enables regular automated scans. ■ Scanning for vulnerabilities listed in compliance requirements such as OWASP Top 10 and PCI DSS, and creation of reports in accordance with each requirement. *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration"Betelgeuse" is a file server security scanner that collaborates with OPSWAT's MetaDefender Core to conduct scans using multiple malware detection engines, enabling high-precision and rapid detection of malware hidden within files. The scan results for each file are displayed using overlay icons in Windows Explorer, allowing for intuitive recognition of file vulnerabilities. Please feel free to contact us if you have any inquiries. 【Features】 ■ High-precision malware detection using multiple malware detection engines ■ Scan results for each file are displayed using overlay icons in Windows Explorer ■ Easy operation through a web GUI for the management screen ■ Installation on client PCs requires only the installation of add-on software ■ Simple operations such as conducting individual scans and checking scan details from the context menu *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis service is an Android app security verification service that identifies whether the behavior of the Android app complies with the standards set by the Ministry of Internal Affairs and Communications and Google, as well as whether there is any unauthorized external transmission of user information by the developer. It prevents violations of user privacy and compliance by developers. If the verification result is a failure, there is no additional cost for re-verification of the same app and version after corrections. 【Verification Standards Supported】 ■ Ministry of Internal Affairs and Communications SPI (Smartphone Privacy Initiative) ■ Google Play Policy *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationInvicti can automatically detect vulnerabilities by setting up the target website and starting a scan. By utilizing the scheduling feature, it is also possible to configure regular scan executions. The vulnerabilities detected in the scan results are displayed in a list categorized by severity, and reports can be generated in formats compliant with various compliance requirements. These features simultaneously reduce security-related operational costs and mitigate the risk of being affected by attacks from unknown threats.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration