Network Security

SelectHub is real people helping you find the best Network Security for your unique business needs while recognizing the true solution leaders who help make your decisions possible.
Access and customize for FREE:
  1. Professional requirements in minutes
  2. Shortlist in seconds
  3. Pricing details included
Find the best Network Security for your unique needs
Get Started Right

3 minute completion time (on avg.)

52 Products found for

Network Security

Sort by:

McAfee Network Security Platform

User Satisfaction:
100%

McAfee Network Security Platform is an intelligent security solution that discovers and blocks sophisticated threats in the network. Using multiple, advanced signature-less detection techniques such as Advanced Threat Defense, real-time emulation, and endpoint integration, it moves beyond mere pattern matching to defend against unknown stealthy attacks with extreme accuracy

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Clearswift Advanced Threat Protection

User Satisfaction:
100%

Clearswift Advanced Threat Protection’s unprecedented layer of sanitization detects and removes embedded malware evading AV and sandbox analysis without delaying digital activity. Proving to be the most effective and inexpensive defense that can be immediately added-on to your existing security infrastructure. No rip and replace. Clearswift sees 70% growth in its ‘Advanced Threat Protection’ solutionHow Top Cyber Security Teams Neutralize Ransomware AttacksTECH ALERT: New email embedded malware getting through major AV scans

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Clearswift SECURE Email Gateway

User Satisfaction:
100%

Clearswift offers the industry’s most effective layer of real-time email inspection to detect and completely sanitize evasive threats, delivering highly secure email without delay.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Juniper Net Netscreen 5GT

User Satisfaction:
88%

The Juniper Networks NetScreen-5GT Series is a family of three feature-rich, enterprise-class network security solutions. They are ideally suited for securing remote offices, retail outlets and broadband telecommuter environments, where IT staff support is minimal and ease of configuration and management is crucial. The NetScreen-5GT Series integrates key security applications, routing protocols and resiliency features to provide IT managers a cost effective appliance that is easy to deploy and manage.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Sophos UTM

User Satisfaction:
87%

Sophos UTM's simple, intuitive user interface (UI) is designed for YOU. It lets you quickly protect your network and users. And it makes day-to-day management tasks easy. Sophos UTM is easy to use, thanks to the configurable real-time dashboard, flexible modular licensing, and intuitive reusable network object definitions.We've engineered Sophos UTM to deliver outstanding performance. We built our UTM using Intel multi-core technology, solid-state drives, and accelerated in-memory content scanning. Potent, powerful and fast.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Malwarebytes Endpoint Protection

User Satisfaction:
84%

Malwarebytes Endpoint Protection protects the endpoints with next-gen tech that out-thinks malware and traditional security

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Symantec Endpoint Protection

User Satisfaction:
82%

Symantec Endpoint Protection is artificial intelligence fused with critical endpoint technologies that addresses malware and other threats with a layered approach to endpoint security – including new innovations for advanced machine learning and memory exploit mitigation, along with established technologies for file reputation and behavior analysis, firewall and intrusion prevention.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda Security Endpoint Protection

User Satisfaction:
69%

Protection and disinfectionProactive and real-time protection from the cloud thanks to Panda Security's Collective Intelligence.Maximum malware detection, even for malware that exploits unknown (zero-day) vulnerabilities, regardless of the source of infection (email, USB memory sticks, Web, etc)Ease to use, easy to maintainManage the security of all users from anywhere from the Web console.Simple, automatic and/or remote installation.Automatic or scheduled transparent updates to avoid any inconvenience to the user.A level of security for each situation and environmentProfile-based security to adapt the protection to the specific needs of your users.Centralized monitoring of the security status of all PCs, servers and laptops through comprehensive dashboards.Device control to block entire peripheral device categories (USB drives and modems, webcams, DVD/CD, etc.) with whitelists and control of permitted actions (access, read, write).

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda Security for Desktops

User Satisfaction:
64%

Panda protects your PC, Mac® or Android™ device against all types of threats. Enjoy the best antivirus software with real-time protection against the latest malware. Browse, shop and play online with complete peace of mind.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Advanced Threat Protection

User Satisfaction:
50%

The Blue Coat Advanced Threat Protection solution integrates technologies from the Blue Coat Security and Policy Enforcement Center and the Resolution Center to deliver a comprehensive lifecycle defense that fortifies the network.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Web Security Gateway Anywhere

User Satisfaction:
n/a

Websense® web security products provide modern, innovative defenses. They rely upon Websense ACE (Advanced Classification Engine) and the expansive Websense ThreatSeeker® Network for real-time content analysis. They include forward-thinking features such as advanced threat dashboards, forensic reporting and data capture, sandbox analysis of malware, and data-aware defenses that provide containment of sensitive information. And they are easily managed through the Websense TRITON™ Unified Security Center.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

TRITON Enterprise

User Satisfaction:
n/a

Best-in-class security with a unified architecture. Websense® TRITON™ security solutions offer point-of click protection with inline, real-time defenses from Websense ACE (Advanced Classification Engine). ACE unites seven security defenses assessment areas into a composite scoring model using predictive analysis. These unmatched real-time defenses are backed by the Websense ThreatSeeker® Network — the world's largest security intelligence network — and the expertise of Websense Security Labs™ researchers. Data theft and data loss prevention (DLP) built-in at the core. Unlike competitive offerings, TRITON solutions contain DLP in their DNA.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Carbon Black Endpoint Protection

User Satisfaction:
n/a

Carbon Black delivers new generation of endpoint security, purposely designed to protect organization from the most advanced cyberattacks. Their approach to application control, endpoint detection and response (EDR), and next-generation antivirus (NGAV) has been rigorously tested and proven by highly regarded third-party industry analysts.Cb Protection is the only solution to stop 100% of attacks in NSS Labs' Advanced Endpoint Protection (AEP) test. Its Lock down systems to stop malware, ransomware, zero-day, and non-malware attacksCb response is a highly scalable, real-time EDR with unparalleled visibility for top security operations centers software. Its has Unlimited data retention for investigating long-term attacks with extreme dwell timeCB Defense is a next-generation antivirus + EDR in one cloud-delivered platform that stops commodity malware, advanced malware, non-malware attacks and ransomware

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Traps Advanced Endpoint Protection

User Satisfaction:
n/a

Prevent Security BreachesPreemptively block known and unknown malware, exploits and zero-day threats with the unique multi-method prevention approach of Traps™ advanced endpoint protection from a single, lightweight agent. Automate PreventionAutomatically reprogram your endpoints to block known and unknown threats – without human intervention – using threat intelligence gained from our global community of customers and partners across endpoints, networks and SaaS applications.Protect and Enable UsersEmpower users to use web-, mobile- and cloud-based applications without fearing cyberthreats. Protect users from inadvertently compromising their systems without depending on burdensome virus scans.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Barracuda Network Security

User Satisfaction:
n/a

Barracuda’s powerful, best-of-breed security products secure your organizations threat vectors – email, web applications, remote access, web browsing, mobile Internet, and network perimeters whether on premises or in the cloud. Leveraging the benefits of hardware, cloud, and virtual technology, backed by threat intelligence from Barracuda Central — Barracuda solutions consistently deliver total threat protection from zero day, advanced malware, automated threats, and other attacks.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Check Point Appliances

User Satisfaction:
n/a

With perimeters no longer well-defined and threats growing more intelligent every day, we need an architecture combining high-performance network security devices with real-time proactive protections for north-south and east-west traffic. Our enforcement points provide the flexibility to custom fit security enforcements in the modern enterprise.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Call SelectHub for a free 15-minute selection analysis: 1-855-850-3850

Cisco Network Security

User Satisfaction:
n/a

Cisco provides one of the industry’s most comprehensive advanced threat protection portfolios of products and solutions. Our threat-centric and operational approach to security reduces complexity, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Intel Networking Security and Appliances

User Satisfaction:
n/a

Deliver the most advanced data security solutions with Intel® processors that support cryptography, compression, intrusion detection, pattern matching, and network processing unit (NPU)-type small packet processing. Take advantage of Intel® QuickAssist Technology, a set of software and hardware modules that accelerate bulk encryption, data compression, and other workloads, supported by Intel® Atom™ processors through to Intel® Xeon® processors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Juniper Security

User Satisfaction:
n/a

High-performance security with advanced, integrated threat intelligence, delivered on the industry's most scalable and resilient platform. SRX Series gateways set new benchmarks with 100GbE interfaces and feature Express Path technology, which enables up to 1 Tbps performance for the data center.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Next-Generation Firewall (NGFW)

User Satisfaction:
n/a

WatchGuard’s powerful Fireware® operating system is the fastest, most reliable, most agile platform in the industry. It’s designed to run full versions of the leading security engines in every category, so we make sure you’re always at the top of the food chain. And with built-in headroom, you can scale up whenever you need to. You get all the performance, all the protection – all on your terms.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Nexcom Network Security Appliance

User Satisfaction:
n/a

To protect customer's dayily operation in e-business generation, NEXCOM offers the most trustworthy and reliable network security appliance, from wireless network security, security hardware platforms, and network security appliances to network security hardware platforms. Featuring powerful networking performance and a multitude of LAN ports, NEXCOM’s network security appliances are ideal solutions for SSL VPN, link/server load balancing, IDP/IPS, bandwidth management, firewall, anti-spyware, UTM, network access control and AAA server.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

UTMs and Next Generation Firewalls

User Satisfaction:
n/a

Cyberoam network security appliances, available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. Cyberoam ensures high levels of network security, network connectivity, continuous availability and secure remote access with controlled network access to road warriors, telecommuters, partners, customers.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Next-Generation Firewall

User Satisfaction:
n/a

By focusing on content, applications, and users - not ports and protocols - we’re delivering a truly innovative platform that offers enterprises the much needed visibility and control to safely enable modern applications, without having to absorb the risks that typically accompany them. At the core of these network security products is the Palo Alto Networks Next-Generation Firewall, which helps enterprises simplify their network security infrastructure.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda GateDefender eSeries

User Satisfaction:
n/a

The best antivirus products and solutions for managing your company's devices. Wherever you are, manage the protection and security of your business and its devices from the cloud.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Dell SonicWALL Firewalls

User Satisfaction:
n/a

The Dell SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, and Application Intelligence and Control with real-time Visualization. The Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet the needs of the most high-performance networks.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Stormshield Network Protection

User Satisfaction:
n/a

Because a security solution represents an investment for several years, Stormshield Network Security products offer the requisite modularity and features for keeping abreast of future changes in the information system. In a “Bring-Your-Own-Everything” world, it has become even more of a challenge keeping users in check while developing an agile corporation that moves with the times. The only way for security to be effective is when it is seamless for both users and administrators.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Mike Simonton

User Satisfaction:
n/a

Tuliva is a Managed Services provider, provdiging hybrid IT Security Services and Cloud Hosting.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

2FA One

User Satisfaction:
n/a

2FA provides a turn-key solution that is easy to evaluate, procure, deploy, manage, and use. The solution, 2FA ONE, is focused on leveraging devices that an organization may already have in place, such as building access badges, embedded fingerprint scanners, smart phones, etc.; while at the same time making life easier and more secure for end users through the use of single sign-on (SSO) technology.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

G-Yu Security Architecture

User Satisfaction:
n/a

Enterprise Security architecture is a conceptual blueprint of a company’s network security architecture, related security mechanisms and related security policy. It provides the framework for the strategies and tools that need to work cohesively for the company to manage core digital assets, to troubleshoot security issues and to build a structured, meaningful security practice. One of the best ways to let our enterprise security architects begin adding value is to have them conduct a Thorough Security Assessment.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

DATASHIELD Advanced Security Operations Center (ASOC)

User Satisfaction:
n/a

DATASHIELD provides a comprehensive solution, tailored to your enterprise, that not only builds you secure data walls, but also provides you with a team of cyber experts that identify and parses threats, zeroes in on potential and real breaches, and gives you actionable intelligence to respond to those breaches before they do serious damage.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

CGI Cybersecurity

User Satisfaction:
n/a

Businesses and governments are transforming to better serve an increasingly digital world. With greater connection comes increased cybersecurity risk. Today’s reality is that there is no “perfect” security, and even the most diligent organizations may be compromised. Yet, citizens and customers want assurance that their data is secure. Enterprises look to CGI’s expertise to build security into every aspect of their operations: from infrastructure and networks, to mobile applications, to employee education and business continuity. We partner with our clients to assess and analyze potential cyber risks, continuously monitor for threats in real-time, put in place the necessary defenses and ensure continuity of operations, even during a cyber incident.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Duo Two-Factor Authentication

User Satisfaction:
n/a

Every user can authenticate even when they’re offline, with mobile apps, or just landlines. Users can also have multiple devices, and choose their preferred method during login.Different methods are available for different business situations.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Real People... with Data

We know selecting software can be overwhelming. You have a lot on the line and we want you to make your project a success, avoiding the pitfalls we see far too often.

As you get started with us, whether it be with Software Requirements templates, Comparing, Shortlisting Vendors or obtaining that elusive Pricing you need; know that we are here for you.

Our Market Research Analysts will take calls, and in 10 minutes, take your basic requirements and recommend you a shortlist to start with.