Pergunte aos nossos especialistas

Soluções de Projeto

Obter aconselhamento: Bate-papo ao vivo | +1-626-655-0998 | E-mail

Security

Discover top-tier security solutions designed to protect your digital environment. This category offers premium security products from two leading brands: Moresec Security and Ruijie Security.

Why Choose Our Security Solutions?

  • Comprehensive Protection: Our solutions cover firewall and security for all your network needs.
  • Advanced Technology: Implement cutting-edge firewalls and network security measures to safeguard your data.

Features and Advantages:

Whether you are a business aiming to secure your corporate network or an individual looking to protect personal information, our range of products from Moresec Security and Ruijie Security is designed to meet your specific needs. These solutions offer robust firewall security, network firewall security, and come with a security license to ensure compliance and protection across your operations.

Popular Security Series:
Filtrar Por

15 artigos

Definir Ordenação Decrescente
Ver como Lista Grelha
  1. RG-WALL 1600-Z3200

    Condição: Novo

    150W AC power module
    189,00 US$
  2. RG-WALL 1600-Z5100-LIS-1Y

    Classificação:
    100%
    5/5.0

    Condição: Novo

    Wi-Fi 6 Quad-Radio Enhanced Access Point. 802.11ax four-radio enhanced high-density AR series wireless access point; supports wireless minimalist all-optical solution, the whole machine supports a maximum of 10 spatial streams, the highest access rate of the whole machine is 8.642Gbps, and can support 802.11a/b/g/ n/ac and 802.11ax work, fat/thin mode switching, 802.3bt/at/af power supply and local DC power adapter power supply
    287,00 US$
  3. RG-WALL 1600-Z3200-LIS-1Y

    Condição: Novo

    802.11ax three-way dual-band enhanced high-density wireless access point; the whole machine supports a maximum of 10 spatial streams, the highest access rate of the whole machine is 6.817Gbps, and can support 802.11a/b/g/n/ac and 802.11ax Work, fat/thin mode switching, 802.3at power supply and local power supply
    485,00 US$
  4. HPC-8032P

    Classificação:
    100%
    5/5.0

    Condição: Novo

    Protect assets by constructing honeypots to attract attacks based on Deception Defense technology
  5. HPC-8016P

    Classificação:
    80%
    4/5.0

    Condição: Novo

    Protect assets by constructing honeypots to attract attacks based on Deception Defense technology
  6. HPC-8008P

    Classificação:
    100%
    5/5.0

    Condição: Novo

    Protect assets by constructing honeypots to attract attacks based on Deception Defense technology
  7. XM-9200

    Classificação:
    100%
    5/5.0

    Condição: Novo

    provides visibility into IaaS and PaaS to ensure the controls over multi-cloud environment
  8. XM-9100

    Classificação:
    100%
    5/5.0

    Condição: Novo

    provides visibility into IaaS and PaaS to ensure the controls over multi-cloud environment
  9. XM-9050

    Classificação:
    100%
    5/5.0

    Condição: Novo

    provides visibility into IaaS and PaaS to ensure the controls over multi-cloud environment
  10. IAST-9020

    Classificação:
    100%
    5/5.0

    Condição: Novo

    Interactive Application Security Testing (IAST) help to automatically identify and diagnose vulnerabilities within application.
  11. IAST-9010

    Classificação:
    80%
    4/5.0

    Condição: Novo

    Interactive Application Security Testing (IAST) help to automatically identify and diagnose vulnerabilities within application.
  12. IAST-9005

    Classificação:
    80%
    4/5.0

    Condição: Novo

    Interactive Application Security Testing (IAST) help to automatically identify and diagnose vulnerabilities within application.
  13. SCA-8030

    Classificação:
    80%
    4/5.0

    Condição: Novo

    Software Composition Analysis (SCA) identify open source and third-party components in use in an application
  14. SCA-8020

    Classificação:
    100%
    5/5.0

    Condição: Novo

    Software Composition Analysis (SCA) identify open source and third-party components in use in an application
  15. SCA-8010

    Classificação:
    100%
    5/5.0

    Condição: Novo

    Software Composition Analysis (SCA) identify open source and third-party components in use in an application

15 artigos

Definir Ordenação Decrescente
Ver como Lista Grelha