Small businesses are safe with gateprotect
June 2014, IT infrastructure
Westcon is introducing the gateprotect GPO 110. The firewall provides a competitively priced and robust security solution for small companies.
“With its advanced security features the GPO 110 provides an easy-to-use firewall for up to 15 users with resilient protection for the network, e-mails and secure interconnection via VPN for price-sensitive customers. Another option is that the UTM firewall, together with the firewalls belonging to the GPO series, can be extended to a WLAN access point as well as fixed with features to include endpoint protection,” says Alex Van Zyl, channel manager, gateprotect at Westcon Security Solutions.
The GPO 110 provides SME companies in the local market with a durable firewall developed in Germany with all the functions needed for effective protection against cyber-attacks as well as the best possible performance that safeguards flowing business procedures.
The GPO 110 is easy to configure and manage thanks to eGUI technology and optional endpoint protection in real time.
For more information contact Westcon Security Solutions – Electronic, +27 (0)11 233 3333, email@example.com, www.westcon.co.za
- People on the move
November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
- Home run for integrated security
November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
- Facing the future
November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
- A mobile holiday
November 2017, Access Control & Identity Management, IT infrastructure
The use of mobile devices, specifically smartphones for access control has taken off over the past year or two, with expectations that its adoption will grow even more.
- Access a mobile-first world
November 2017, Axis Communications SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.
- Portable biometric solutions gain ground
November 2017, Powell Tronics, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Portable devices offer a cost-effective and reliable alternative for a number of traditional access control applications.
- Access control as a service
November 2017, Impro Technologies, Access Control & Identity Management, IT infrastructure
Serve the skills and cash shortage notice by opting for access control as a service, which promises to make the access control spending more manageable.
- Cut the wire for easy access
November 2017, MiRO Distribution, Access Control & Identity Management, IT infrastructure
The great debate about hardwired versus wireless systems will no doubt continue for some years to come, but it’s clear that wireless access control is coming into its own.
- Migrating to IP access control
November 2017, Genetec, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Migrating from an existing legacy access control system to an IP-based system offers companies many benefits and even cost savings.
- Smart cities are built on smart thinking
November 2017, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
The smart city concept integrates ICT and various physical devices connected to the network to optimise the efficiency of city operations and services and connect to citizens.
- The complexity of borders
November 2017, Government and Parastatal (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Controlling borders is a critical task for governments the world over, both at official and unofficial entry points where illegal crossings are made.
- The missing mobile puzzle piece
November 2017, Securicom IT Solutions, Cyber Security, IT infrastructure
Companies are neglecting to define what resources can be accessed via mobile and have not identified what devices are already accessing the network.