اسأل خبرائنا

حلول المشاريع وأمبير. تقنية.

احصل على نصيحة: دردشة مباشرة | +1-626-655-0998 | بريد إلكتروني

Security

Discover top-tier security solutions designed to protect your digital environment. This category offers premium security products from two leading brands: Moresec Security and Ruijie Security.

Why Choose Our Security Solutions?

  • Comprehensive Protection: Our solutions cover firewall and security for all your network needs.
  • Advanced Technology: Implement cutting-edge firewalls and network security measures to safeguard your data.

Features and Advantages:

Whether you are a business aiming to secure your corporate network or an individual looking to protect personal information, our range of products from Moresec Security and Ruijie Security is designed to meet your specific needs. These solutions offer robust firewall security, network firewall security, and come with a security license to ensure compliance and protection across your operations.

Popular Security Series:
تصفح عبر

15 عناصر

تحديد الاتجاه التنازلي
مشاهدة كا قائمة الشبكة
  1. RG-WALL 1600-Z3200

    الشرط: جديد

    150W AC power module
    ١٨٩٫٠٠ US$
  2. RG-WALL 1600-Z5100-LIS-1Y

    Rating:
    100%
    5/5.0

    الشرط: جديد

    Wi-Fi 6 Quad-Radio Enhanced Access Point. 802.11ax four-radio enhanced high-density AR series wireless access point; supports wireless minimalist all-optical solution, the whole machine supports a maximum of 10 spatial streams, the highest access rate of the whole machine is 8.642Gbps, and can support 802.11a/b/g/ n/ac and 802.11ax work, fat/thin mode switching, 802.3bt/at/af power supply and local DC power adapter power supply
    ٢٨٧٫٠٠ US$
  3. RG-WALL 1600-Z3200-LIS-1Y

    الشرط: جديد

    802.11ax three-way dual-band enhanced high-density wireless access point; the whole machine supports a maximum of 10 spatial streams, the highest access rate of the whole machine is 6.817Gbps, and can support 802.11a/b/g/n/ac and 802.11ax Work, fat/thin mode switching, 802.3at power supply and local power supply
    ٤٨٥٫٠٠ US$
  4. HPC-8032P

    Rating:
    100%
    5/5.0

    الشرط: جديد

    Protect assets by constructing honeypots to attract attacks based on Deception Defense technology
  5. HPC-8016P

    Rating:
    80%
    4/5.0

    الشرط: جديد

    Protect assets by constructing honeypots to attract attacks based on Deception Defense technology
  6. HPC-8008P

    Rating:
    100%
    5/5.0

    الشرط: جديد

    Protect assets by constructing honeypots to attract attacks based on Deception Defense technology
  7. XM-9200

    Rating:
    100%
    5/5.0

    الشرط: جديد

    provides visibility into IaaS and PaaS to ensure the controls over multi-cloud environment
  8. XM-9100

    Rating:
    100%
    5/5.0

    الشرط: جديد

    provides visibility into IaaS and PaaS to ensure the controls over multi-cloud environment
  9. XM-9050

    Rating:
    100%
    5/5.0

    الشرط: جديد

    provides visibility into IaaS and PaaS to ensure the controls over multi-cloud environment
  10. IAST-9020

    Rating:
    100%
    5/5.0

    الشرط: جديد

    Interactive Application Security Testing (IAST) help to automatically identify and diagnose vulnerabilities within application.
  11. IAST-9010

    Rating:
    80%
    4/5.0

    الشرط: جديد

    Interactive Application Security Testing (IAST) help to automatically identify and diagnose vulnerabilities within application.
  12. IAST-9005

    Rating:
    80%
    4/5.0

    الشرط: جديد

    Interactive Application Security Testing (IAST) help to automatically identify and diagnose vulnerabilities within application.
  13. SCA-8030

    Rating:
    80%
    4/5.0

    الشرط: جديد

    Software Composition Analysis (SCA) identify open source and third-party components in use in an application
  14. SCA-8020

    Rating:
    100%
    5/5.0

    الشرط: جديد

    Software Composition Analysis (SCA) identify open source and third-party components in use in an application
  15. SCA-8010

    Rating:
    100%
    5/5.0

    الشرط: جديد

    Software Composition Analysis (SCA) identify open source and third-party components in use in an application

15 عناصر

تحديد الاتجاه التنازلي
مشاهدة كا قائمة الشبكة