Vendors

Nastavitve
vendors
Vsebina
Ucopia Communications

Ucopia offers solutions related to wireless and wired networks access control in the scope of broadly defined guest access.

DIGI International

Digi International is a recognized supplier of broadly understood Internet of Things (IoT) connectivity solutions. The portfolio includes 3G, LTE and 5G Ready routers for offices or points of sales, dedicated to industrial systems (ISC, SCADA) exposed to adverse environmental conditions, such as temperature, shock, dust, as well as dedicated to supporting logistics fleets, equipped with a GSM module and a cryptographic processor. Digi’s solutions give priority to ensuring continuous connectivity, which is why the routers have high-availability features, such as two LTE modems and two SIM slots. Digi’s portfolio also includes USB and serial communication hubs (RS232/422/428), converters and terminal servers, which along with LTE routers will enable participation in the IoT revolution.

SailPoint Technologies

SailPoint Technologies is an American company founded in 2005. For many years it has been a global leader on the market of Identity and Access Management products. SailPoint products allow you to create a coherent and organization-wide policy for managing access to such resources as: data, applications, infrastructure.

Cryptme

Cryptme is the only solution available on the market whose main function is to provide a discrete voice connection that cannot be intercepted (eavesdropped) or recorded digitally or analog. The use is similar to using a regular cell phone. The creation of an additional access terminal is necessary to ensure proper operation. Communication is only possible with a person with a similar set and access to the service.

SentinelOne

SentinelOne is a provider of a complete Endpoint Detection and Response (EDR) solution that responds to today's endpoint threats, including ransomware and 0-day attacks. The solution developed by SentinelOne protects employees' computers, servers, virtual machines and containers in the cloud. It covers all stages of risk prevention and incident response — identification of threats and protection, detection and response to incidents and system recovery in the event of a security breach — thus meeting the expectations of SOC and CSIRT / CERT units.