View
Sorting
Products found: 21
Dell PowerEdge MX7000 Modular Chassis
- 7U modular enclosure with eight slots holds 2S single or four 4S double-width compute sleds and 12Gbs single-width storage sleds
- 25Gb Ethernet, 12Gb SAS and 32Gb Fibre Channel I/O options
- Three I/O networking fabrics, two general purpose and one storage specific, each with redundant modules
- Multi-chassis networking up to 10 chassis
- Single management point for compute, storage and networking
- High-speed technology connections, now and into the future, with no midplane upgrade
- At least three server processor microarchitecture generation support assurance
- Full-featured, no compromise compute sleds with Intel® Xeon® Scalable processors
- Generous, scalable on-board SAS, SATA, and NVMe storage drives, plus substantial, granular SAS direct-attached storage using optional storage sleds
- Scalable fabric architecture with a grow-as-you-need fabric expansion capability for up to 10 chassis in fabric.
- Automatic expansion from one to multiple chassis; scale management to thousands of PowerEdge MX and rack servers with OpenManage Enterprise
- Flexible, at-the-box management front control panel options include Quick Sync 2 (wireless), touchscreen LCD and traditional crash cart
- Comprehensive RESTful API helps automate multiple tasks and integrates to third-party tools
- Seamlessly integrates with integrated Dell Remote Access Controller 9 (iDRAC9) and Lifecycle Controller (LC)
- Multi-generational assurance with support for at least three server processor microarchitecture generations
- Nearly zero throughput limitations, providing high-speed technology connections, and well into the future, with no midplane upgrade
- Industry-leading thermal architecture and mechanical design and control algorithms support dense configurations and future compatibility
Dell Precision Workstations
Precision Mobile Workstations - For professional creators
Highest performing and fully customizable workstations certified with professional applications.
Precision Fixed Workstations - For professional creators
Highest performing and fully customizable workstations certified with professional applications.
Dell Wyse 3040 Thin Client
DELL Блейд-массив EqualLogic PS-M4110
DELL Общая инфраструктура - Конвергентные платформы
DELL Серверы PowerEdge в корпусе Tower
DELL Стоечный сервер PowerEdge C6320
DELL Управление клиентскими системами
DevelopEx Software Development
- Highly talented teams with great budgets. 200+ people working full-time on client projects. We are most effective in starting teams of 3-10 engineers!
- Software Development Process based on world best practices, that we have been refining for 17 years now with more than 20,000 man/months of services provided.
- Structured risk management through experimental and lean approach.
- Scalable recruitment process to get the best people working with us as fast as possible.
- Culture to foster innovation, generate ideas and solve issues for our clients.
- Always win-win oriented, with full transparency and accountability practices embedded in the process.
Intel Server Chassis and System
World-Class Quality. Intel Server Boards, Intel Server Systems, and Intel Server Chassis are built on a foundation of industry-leading, high-quality technology. Rigorous testing and extensive validation means reliable solutions you can trust. Feature-Rich Products. Intel Server Boards and Intel Server Systems are designed to span multiple server use cases and customization requirements with performance, power, and cost flexibility to meet your existing requirements with headroom for growth. Commitment. Intel is committed to providing you an unmatched customer experience with a standard three-year warranty, 24/7 access to our experts, and the confidence of knowing you have Intel in your corner. Get the most from innovative high performance Intel Server Systems. From 1U single-socket, short form factor web-hosting appliances to high reliability 2U mission critical systems, we have what you need. Intel Servers family delivers power and performance at peak efficiency in a 1U and 2U rack mount server form factor that features the energy- efficient dual Intel Xeon processor Scalable family. High memory capacity, networking, storage, and I/O flexibility combine with innovative design to provide an exceptional and reliable server for business IT, appliance, data center, cloud, and high performance computing applications. Powerful Compute Combined with Flexible I/O, Storage, and Networking Capacity:
- Dual CPU sockets with support for the Intel Xeon processor Scalable family
- Up to 24 DDR4 DIMMs
- Three riser card slots with support for up to eight PCIe* 3.0 add-in cards for high configuration flexibility
- Four on-board PCIe* OCuLink* connectors for direct attach NVMe* 2.5” SSD support
- Networking flexibility via 10 G SFP+ and 10 GBase-T OCP mezzanine modules
- Available in 1U and 2U systems with support for up to 24 NVMe* drives in a 2U chassis
- Support for the full line of Intel RAID Modules
- Intel QuickAssist Technology (Intel QAT) delivers up to 100 Gbps performance for authentication, public key functions, and compression/decompression workloads, while freeing up CPU cycles and reducing demands on the server
- NVMe* enablement alleviates the I/O bottleneck with high performance and capacity
- Intel Omni-Path Architecture (Intel OPA) integration delivering 100 Gb/s port bandwidth for improved performance and lower latency in medium to large clusters
- Integrated 10 G Ethernet with RDMA eliminates TCP/IP overhead by offloading transport to NIC for faster switching and packet filtering
- Intel Virtual RAID on CPU (Intel VROC) enables high-performance, highly scalable CPU-based RAID with NVMe with high IOPS and low latency
- Digitally signed statement of conformance
- Platform certificates provided with a secured firmware Trusted Platform Module (TPM)
- Server component data tracked and saved for 20 years
- Firmware load verification
Intel® Storage System
Logitech C310
WIDESCREEN HD 720P VIDEO CALLS
Make high-definition video calls on your favorite platforms like Skype™. At 30 frames per second, video quality is smooth, while images are crisp, colorful and contrasted.
YOUR VOICE IS HEARD
The built-in noise-reducing mic makes sure your voice comes across clearly, even if you’re in busy surroundings.
LOOK YOUR BEST
Even if you’re video calling or recording in dim surroundings, the C310 adjusts to the lighting conditions to produce brighter, contrasted images.
FIRMLY FIXED
The webcam comes with a universal clip. You can either attach it securely to your screen or sit it on a shelf.
FLEXIBILITY THAT GOES BEYOND BUILT-IN
Small, agile and adjustable, the C310 Webcam brings a whole new angle to video calling.
PowerEdge Rack Server
Trend Micro Consumer Connect
Keep Customers Safe from the Newest Threats
Stop Malicious Software The evolution of new technology and infrastructure will steadily lead to more and more security vulnerabilities. Trend Micro now monitors threat activities around the clock across both networks and endpoints. Thanks to big data and machine learning, Trend Micro identifies new anomalies and risks faster than ever before. Protect More Than Devices Many new types of simple IoT devices now connect to the internet through new protocols. Trend Micro offers a wide range of innovative solutions to protect your customers, making it simple for them to feel completely safe online. Secure Networks New devices keep transmitting more kinds of data to each other and to the cloud. Only a multi-layer security solution can deal with network threats and stop invasive data collection schemes to protect the privacy of your customers. Manage with a Simple Console Maintaining security throughout the network poses a big challenge to telecoms relying on a variety of solutions. An intuitive management console allows for the effective management of monitoring and response systems.Comprehensive Solutions for Telecom Providers
SCAM & FRAUD DETECTION Block phishing scams using the latest AI technology with context analysis to stop web or email social engineering attacks. PRIVACY & IDENTITY PROTECTION Block dangerous websites that steal personal data and alert customers whose data has started circulating on the Dark Web. ADVANCED AI TECHNOLOGY Artificial Intelligence and machine learning can detect suspicious events before connected household devices suffer an attack. PARENTAL CONTROLS Help children use the web safely, featuring a single setup process and content limits for all their devices. COMPLETE DEVICE PROTECTION Take advantage of enterprise intrusion prevention technology and cloud intelligence to protect the entire networks of customers from attacks. WEB THREAT SUPPRESSION Defend against ransomware and other dangers to ensure the security of online transactions from home wifi networks. DELIVER PROTECTION ANYWHERE Secure mobile devices no matter where they go.Comprehensive Solutions for Telecom Providers
- Easy Integration
- Accelerated Business Growth
- New Marketing Channels
- Greater Customer Satisfaction
Trend Micro Deep Discovery Analyzer
Deep Discovery Analyzer extends the value of existing security investments from Trend Micro and third-parties (through a web services API) by providing custom sandboxing and advanced analysis. It can also provide expanded sandboxing capabilities to other Trend Micro products. Suspicious objects can be sent to the Analyzer sandbox for advanced analysis using multiple detection methods. If a threat is discovered, security solutions can be updated automatically.
KEY CAPABILITIES:
Custom Sandbox Analysis uses virtual images that are tuned to precisely match your system configurations, drivers, installed applications, and language versions. This approach improves the detection rate of advanced threats that are designed to evade standard virtual images. The custom sandbox environment includes safe external access to identify and analyze multi-stage downloads, URLs, command and control (C&C), and more, as well as supporting manual or automated file and URL submission.
Flexible Deployment Analyzer can be deployed as a standalone sandbox or alongside a larger Deep Discovery deployment to add additional sandbox capacity. It is scalable to support up to 60 sandboxes in a single appliance, and multiple appliances can be clustered for high availability or configured for a hot or cold backup.
Advanced Detection Methods such as static analysis, heuristic analysis, behavior analysis, web reputation, and file reputation ensure threats are discovered quickly. Analyzer also detects multi-stage malicious files, outbound connections, and repeated C&C from suspicious files.
Broad file analysis range Examines a wide range of Windows executables, Microsoft Office, PDF, web content, and compressed file types using multiple detection engines and sandboxing. Custom policies can be defined by file type.
Document exploit detection Discovers malware and exploits delivered in common document formats by using specialized detection and sandboxing.
URL analysis Performs sandbox analysis of URLs contained in emails or manually submitted samples.
Web services API and manual submission Enables any product or malware analyst to submit suspicious samples. Shares new IOC detection intelligence automatically with Trend Micro and third-party products.
Support for Windows, Mac, and Android operating systems.
Detect ransomware Detects script emulation, zero-day exploits, targeted and password-protected malware commonly associated with ransomware. IT also uses information on known threats to discover ransomware through pattern and reputation-based analysis. The custom sandbox can detect mass file modifications, encryption behavior, and modifications to backup and restore.
Trend Micro Detection and Response
Today’s advanced threats are designed to bypass traditional cybersecurity defenses and compromise sensitive corporate data by exfiltrating or encrypting it for ransom.
Effective detection and response solutions seek out these advanced threats and eliminate them before they compromise data.
Trend Micro has integrated layered advanced detection and response techniques into its Endpoint Protection Platform to leverage its automation and response capabilities. Machine learning (both pre-execution and run-time), vulnerability protection, behavioral analysis, application control, and other advanced techniques are designed to work seamlessly with your endpoint protection.
To fully understand how an advanced attack penetrated security defenses and how it morphed and spread to manifest itself into an enterprise, security researchers need to be able to build a Root Cause Analysis. The analysis is done by recording system events and behaviors and investigating the data. To that end, we offer two options:
Trend Micro Endpoint Sensor
An optional component for Trend’s endpoint protection platform. Endpoint Sensor records system events and behaviors on endpoints, allowing threat investigators to search user telemetry for advanced threats using IOCs (Indicators of Compromise) or potential attacks using IOAs (Indicators of Attack).
Understand the entry, spread, and depth of attacks. The sensor can generate a root cause analysis and create a remediation plan.
Trend Micro Managed Detection and Response
Provides 24/7 alert monitoring, alert prioritization, investigation, and threat hunting services to Trend Micro customers as a managed servicer.
The MDR service collects data from endpoints, network security, and server security to correlate and prioritize alerts and system information and determine a full root cause analysis. Our threat investigators investigate on behalf of you and provide a full remediation plan.
Trend Micro Endpoint Security
- File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.
- C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.
- Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).
- Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).
- Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.
- Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.
- Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.
- Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).
- Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.
- Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.
- Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.
Trend Micro Hosted Email Security
Trend Micro Hosted Email Security is a no-maintenance-required solution that delivers continuously updated protection to stop phishing, ransomware, BEC, advanced threats, spam and malware before they reach your network. It protects Microsoft Exchange, Microsoft Office 365, Gmail and other hosted and on-premises email solutions.
Key features:
Layered protection: Provides protection for phishing, spam, and graymail with multiple techniques, including sender reputation, content and image analysis, machine learning, and more.
Email fraud protection: Protects against BEC with enhanced machine learning, combined with expert rules, analyzing both the header and content of the email.
Document exploit protection: Detects advanced malware and exploits in PDF, Microsoft Office, and other documents using static and heuristic logic to detect and examine abnormalities.
Zero-day protection: Combines pre-execution machine learning, anti-malware, and dynamic analysis using sandboxing to detect zero-day malware.
Cloud sandboxing: Includes cloud sandboxing for automatic in-depth simulation and analysis of potentially malicious attachments in a secure virtual environment hosted by Trend Micro.
URL time-of-click: Blocks emails with malicious URLs before delivery and re-checks URL safety when a user clicks on it.
Web reputation service: Scans URLs embedded in emails and blocks URLs leading to malicious sites by using the enhanced web reputation services from the Trend Micro Smart Protection Network.
Email encryption: Policy-driven email encryption includes hosted key management service and enables recipients to read encrypted emails on any device using a web browser.
Data loss prevention (DLP): Provides DLP profiles to make it easier to track and document sensitive data, and safeguard confidential information.
Source verification and authentication: Includes Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting and Conformance (DMARC).
Threat intelligence: Uses the Smart Protection Network, one of the largest threat intelligence databases, to correlate web, email, file, domain registries, and many other threat sources to identify attacker infrastructures, before they are launched.
Trend Micro IoT Security
ИБП двойного преобразования Dell Smart-UPS
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.