Small businesses are safe with gateprotect June 2014, IT infrastructure
Westcon is introducing the gateprotect GPO 110. The firewall provides a competitively priced and robust security solution for small companies.
“With its advanced security features the GPO 110 provides an easy-to-use firewall for up to 15 users with resilient protection for the network, e-mails and secure interconnection via VPN for price-sensitive customers. Another option is that the UTM firewall, together with the firewalls belonging to the GPO series, can be extended to a WLAN access point as well as fixed with features to include endpoint protection,” says Alex Van Zyl, channel manager, gateprotect at Westcon Security Solutions.
The GPO 110 provides SME companies in the local market with a durable firewall developed in Germany with all the functions needed for effective protection against cyber-attacks as well as the best possible performance that safeguards flowing business procedures.
The GPO 110 is easy to configure and manage thanks to eGUI technology and optional endpoint protection in real time.
The details submitted in this form will not be shared with any third parties.
Now look here! February 2019, Technews Publishing, This Week's Editor's Pick, IT infrastructure Hi-Tech Security Solutions asks industry specialists what display issues should be considered when equipping control rooms with monitors.
50% of companies can’t detect IoT breaches February 2019, This Week's Editor's Pick, Cyber Security, IT infrastructure Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.
Cross-campus Wi-Fi connectivity February 2019, Education (Industry), IT infrastructure, Products Charles Telfair Campus selected Ruckus Networks to deploy its campus-wide wireless network, providing learners and staff with quality Wi-Fi experience for the digital ag
SME cybersecurity: high risk February 2019, Cyber Security, IT infrastructure Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.
Trust but continually verify November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
Physical/logical convergence November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
Physical and logical convergence is a fact November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure Convergence, the next buzzword? A dated buzzword? Is convergence merely integration on steroids? What is convergence?
The expanding role of IT in access control November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure What role is IT playing in the world of physical access control and how far will its role expand in future?
BIMS set to change identity management November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
IP is no stranger to access control November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
Digital channels and the evolution of ID November 2018, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure While the concept of identity (ID) remains unchanged, the rapid evolution of digital technology has dramatically extended both its application and form factor.