Welcome to Secure Datacom Inc.  

Perimeter Security
Network Security
Data Security
Security Services



. : Perimeter Security Solutions – Firewalls and VPNs

Check Point, www.checkpoint.com

Product Overview:

Perimeter Security:

Internal Security:

Web Security:

High-End Security:

VPN – EndPoint:

Networking and Security with Juniper Networks

Juniper Networks, www.juniper.com

Solution Overview:

Juniper Networks Firewall / IPSec VPN

Complete line of firewall / VPN solutions for enterprises and service providers - Tightly integrated set of best-in-class security applications to protect against Worms, Trojans, Viruses and other malware

Multiple management mechanisms including complete CLI, WebUI or centralized management via NetScreen Security-Manager facilitate rapid deployment while minimizing ongoing operational costs

The Juniper Networks family of purpose-built security solutions are designed to satisfy customer networking and security requirements that range from small branch office and telecommuter locations to high speed carrier and data center environments. .

Juniper Networks Firewall / IPSec VPN Platform Selection Guide

Target Deployment

Key Features

Platform

Small branch offices, remote offices, retail outlets and fixed telecommuters

New small branch office security appliances that meld comprehensive security and performance with WAN connectivity and routing

Unified Threat Management (UTM) security features including Stateful firewall, IPS, Antivirus (Anti-Spyware, Anti-Phishing, Anti-Adware), Anti-Spam, and Web Filtering to protect the network from attack

Rapid Deployment to quickly streamline widely distributed deployments while controlling OPEX

SSG 5
SSG 20

Unified Threat Management (UTM) security features including Stateful firewall, IPS, Antivirus (Anti-Spyware, Anti-Phishing, Anti-Adware), Anti-Spam, and Web Filtering to protect the network from attack

Network segmentation, dynamic routing and multiple deployment modes simplifies network integration and deployment of internal security

Rapid Deployment to quickly streamline widely distributed deployments while controlling OPEX

NetScreen-HSC
NetScreen-5GT
NetScreen-5GT ADSL
NetScreen-5GT Wireless
NetScreen-5XT

Medium to large branch offices and stand-alone medium enterprises

Purpose-built security appliances that deliver high-performance, security, and modular LAN/WAN connectivity

Unified Threat Management (UTM) security features including Stateful firewall, IPS, Antivirus (Anti-Spyware, Anti-Phishing, Anti-Adware), Anti-Spam, and Web Filtering to protect the network from attack

Network segmentation, dynamic routing and multiple deployment modes simplifies network integration and deployment of internal security

Deploy as a consolidated firewall and LAN/WAN routing device to reduce IT CAPEX and OPEX

SSG 140
SSG 520
SSG 550

Fixed form factor appliances with integrated security applications including FW, IPSec VPN, and IPS (Deep Inspection)

Network segmentation, dynamic routing and multiple deployment modes simplifies network integration and deployment of internal security

NetScreen-25
NetScreen-50
NetScreen-204
NetScreen-208

Medium and large enterprise sites, carrier networks, data centers

High performance FW and integrated Intrusion Prevention (IDP) platform protects high-speed networks from network and application level attacks

Network segmentation, dynamic routing and multiple deployment modes simplifies network integration and deployment of internal security or multiple security domains

Modular I/O architecture delivers high interface density and flexibility for varied connectivity requirements

Stateful FW and VPN high availability solution with sub-second fail-over to maintain business continuity

ISG 1000
ISG 2000
ISG with IDP

High performance Firewall / VPN platform protects high-speed data centers and carrier environments

Network segmentation, dynamic routing and multiple deployment modes simplifies network integration and deployment of internal security or multiple security domains

Modular I/O architecture delivers high interface density and flexibility for varied connectivity requirements

Stateful Firewall and VPN high availability solution with sub-second fail-over to maintain business continuity

NetScreen-500
NetScreen-5200
NetScreen-5400

Secure Computing Corporation

Secure Computing, www.securecomputing.com

Product Overview:

Secure Computing's line of Network Gateway Security (UTM/Firewall/VPN) solutions

 

 

SnapGear™

Sidewinder G2®

CyberGuard® TSP

 

 

SnapGear Appliances

 

Sidewinder G2 Security Appliance

 

CyberGuard TSP

Solutions

 

   • UTM/Firewall/VPN/Secure Apps
   • Intrusion Prevention
   • Compliance

 

Organization

 

 Home office

 Small to medium       Business

 Enterprise remote       office

 

 Midsize

 Enterprise

 Government

 

 Midsize

 Enterprise

 Government

 

Speed

 

30 Mbps - 300 Mbps

 

75 Mbps up to
multi-gigabit

 

200 Mbps up to
multi-gigabit

 

Platforms

 

Full line of appliances

 

Full line of appliances

 

Full line of appliances

 

Key Features

 

Intrusion prevention
Anti-virus
Wireless
LAN in-a-box
VPN - IPSec & PPTP
UTM

 

Application firewall
ZAP technology
UTM
Anti-virus/spyware
Anti-spam/fraud
Content filtering
SSL decryption

 

Application firewall
ZAP technology
Multi-media filtering
VPN - IPSec
Complete routing

 

Reporting/
Managment

 

Global Command Center

 

G2 Enterprise Manager
G2 Security Reporter

 

Global Command Center

 SoftRemote VPN Client - Remote access that's fast, safe, and low-cost .

  • Connect safely to your Sidewinder G2®-protected site from small work sites, while telecommuting, or on travel.
  • Save money by using your Internet connection to replace costly dial-in lines and other leased lines.
  • Break the 56K barrier by taking advantage of broadband and DSL connections.
  • Take advantage of strong authentication products like SafeWord® RemoteAccess™.
  • Save time with prepackaged client configurations, automatic policy updates, and crypto negotiation.
  • Deploy with confidence using the industry's most popular IPSec client in conjunction with Secure Computing's respected family of security products.

As part of Secure Computing®'s VPN solution, SoftRemote™ is a software package that provides a safe connection between remote users and central sites over the Internet using VPN technology. When connecting across the Internet, SoftRemote lets you use any Internet connection, including broadband and DSL, to link to your site instead of costly dial-up lines or expensive leased lines. SoftRemote uses the industry standard IP Security Protocol ("IPSec") that is supported by our Sidewinder G2® Security Appliance and by other major VPN/firewall and router vendors. SoftRemote also includes an integrated firewall package to give the client computer basic protection against Internet-based attacks.

Virtual private networks (VPNs) based on IPSec provide security, performance, and cost savings unmatched by traditional dial-up and leased networking arrangements. The VPN takes advantage of a site's existing Internet connection, and reduce line costs about 75% by eliminating the site's other dedicated, leased lines. Studies have also shown significant savings when compared to leased frame relay connections. Moreover, VPN clients eliminate the need for dial-in modem banks and costly 800 dial-in numbers, since remote and traveling users can make use of local ISP dial-ins. A VPN also allows telecommuters to take advantage of higher speed broadband or DSL connections, so they aren't limited to relatively slow modem links. Unlike traditional "private" networks provided by commercial carriers, the IPSec protocols provide highly sophisticated security that can't be breached by tapping phone lines or even by eavesdropping at the carrier's central office.

To know more about any of Secure Datacom’s Security Solutions, contact your SDI salesperson or email us.

SDI ©Copyright 2005 home | partners | security | IP telephony | networking | professional services | training | contact
Security Incident Management Web Application Security Content Filtering Load Balancing Traffic Optimization Intrusion Prevention Wireless Security Firewall & VPN Vulnerability Assessment Patch Management NAC, End Point Security Authentication, SSO, & Access Control A/V, Spyware, Internet & Email Security Data Backup & Recovery Data, Email & Portable Device Encryption