Products

Network Security

Network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network Security Concepts

Network Security Concepts

Network security starts with authenticating, commonly with a username and a password. Since this requires just one detail authenticating the user name i.e., the password this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' also used (e.g., a fingerprint or retinal scan).

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis.

Communication between two hosts using a network may be encrypted to maintain privacy.

Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker's methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots.

Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.


 

WatchGuard Technologies

WatchGuard is a provider of integrated network security firewall products and services to small and medium organizations and distributed enterprises. WatchGuard competes in the Unified Threat Management (UTM) and Next Generation Firewall (NGFW) space against Cisco, Palo Alto Networks, Fortinet, Cyberoam, Check Point and Juniper among others.

 

Kaspersky Lab

Kaspersky Lab is an international software security group operating in almost 200 countries and territories worldwide. The company is headquartered in Moscow, Russia, with its holding company registered in the United Kingdom. Kaspersky Lab currently employs over 2,850 qualified specialists. It has 31 representative territory offices in 30 countries and its products and technologies provide service for over 300 million users and over 250,000 corporate clients worldwide. The company is specially focused on large enterprises, and small- and medium-sized businesses.

 

NetApp

NetApp, Inc. is a storage and data management company headquartered in Sunnyvale, California. It is a member of the NASDAQ-100, and has ranked in the Fortune 500 since 2012. Founded in 1992 with an IPO in 1995, NetApp offers software, systems and services to manage and store data, including its proprietary Data ONTAP operating system.

NetApp competes in the data-storage devices industry. In 2009, NetApp ranked second in market capitalization in its industry behind EMC Corporation and ahead of Seagate Technology, Western Digital, Brocade, Imation, and Quantum. In total revenue of 2009, NetApp ranked behind EMC, Seagate, Western Digital, and ahead of Imation, Brocade, Xyratex, and Hutchinson Technology.

 

QLogic

QLogic Corporation is a manufacturer of networking server and storage networking connectivity and application acceleration solutions, based in Aliso Viejo, California.[2] The company provides virtualized, converged, and cloud environment solutions. QLogic’s products include Fibre Channel Adapters, converged network adapter for the Fibre Channel over Ethernet (FCoE) market, Ethernet adapters, iSCSI adapters, and ASICs. QLogic is a NASDAQ Global Select company (NASDAQ symbol: QLGC).

 

Cisco Security

Cisco Systems, Inc. is an American corporation technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment worldwide.It is the largest networking company in the world. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ-100 Index and the Russell 1000 Growth Stock Index.

 

A10 Network

A10 Networks' application networking, load balancing and DDoS protection solutions accelerate and secure data center applications and networks of thousands of the worlds largest enterprises, service providers, and hyper scale web providers. The A10 Thunder™ Series is our premium product family delivering our highest performing application networking solutions up to 220 Gbps. The Thunder Series integrates expanded system resources to support future feature needs, and offers our broadest array of physical, virtual and hybrid form factors.

 

HP

The HP Enterprise Security Products business is part of the HP Software Division. Enterprise security software and solutions that protect what matters most – your users, applications, data and the interactions between them, regardless of location or device. A global threat marketplace collaborates and innovates to attack organizations 24/7. Today’s digital enterprise needs a new style of protection. HPE draws on decades of enterprise security experience and powers much of the world’s security intelligence to uncover vulnerabilities, identify threats and neutralize them so that, instead of simply reacting, you can proactively counter your adversary.

# # # # # # #
#

Why Comptra?

Because Comptra is only working on the channel by selling though the resellers but to the end users. We believe by adding the value to the channel and by using the arms and hands of others we can push the products in the market in various region and domains more efficiently in terms of both quantity and services.

#

Value Added channel program

Comptra works on the resellers qualification by handling the training classes in our Academy. Thanks to our great services from our vendors we certify them, we give them the experience of hands-on training classes and certify them. This makes the resellers and channels to work on their value added business by providing the services and after sales.

#

Wide range of products

We in Comptra believe that we have to provide all the requirements of one project in terms of both Hardware and Software which can be defined as Bundle most of the time. In this case thanks to our great portfolio Bama security deals with the best brands in the domain for all UTMs, Data Storage and End Points.

What's New? Firebox M4600 and M5600

Strong security, top performance, customizable port configuration:
The Firebox M4600 and M5600 are the highest performing fireboxes ever produced, and the perfect fit for larger environments that require blazing speed with maximum flexibility. Network modularity empowers IT professionals to customize the port configuration to meet their needs, as both models provide two slots for expansion modules, and options for 4 x 10Gb fiber, 8 x 1Gb copper, or 8 x 1Gb Ethernet. Redundant power supplies ensure maximum uptime and business continuity in the event of a power supply failure, and Intel Xeon Processors allow industry leading speed while enabling full UTM inspection across all traffic.
Become Our Reseller Partner and Get Benefits