Công Ty Cổ Phần Công Nghệ Nessar Việt Nam - Nessar

Logo
En

VENDORS

How to View Sites, Devices, and Interfaces in LiveNX
14 Month 09

How to View Sites, Devices, and Interfaces in LiveNX

How to View Sites, Devices, and Interfaces in LiveNX   As the network grows more complex, it becomes clear that proper network monitoring software is...

View more
Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical
14 Month 09

Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical

Digital Sovereignty The Precepts of Senhasegura According to an American Periodical   Nomenclatures and acronyms are part of the routine of those who work in...

View more
Why is Data the New Oil?
14 Month 09

Why is Data the New Oil?

Why is Data the New Oil?   Performing any task today is much easier than it was a few years ago. With the evolution of...

View more
Operating System Fingerprint Recognition – Server Message Block (SMB)
14 Month 09

Operating System Fingerprint Recognition – Server Message Block (SMB)

Operating System Fingerprint Recognition – Server Message Block (SMB)   Whether you conduct penetration testing an automated vulnerability scanning, knowing your target is the very...

View more
Why is Information Security Important to Your Organization?
10 Month 09

Why is Information Security Important to Your Organization?

Why is Information Security Important to Your Organization?   As technology becomes increasingly sophisticated, criminals’ skills often evolve as well, in many cases surpassing the...

View more
Protect and Retain Data at Scale
10 Month 09

Protect and Retain Data at Scale

Reduce Data Protection Cost by Over 50% File-based storage systems, such as scale-out NAS, have become more sophisticated, storing and delivering data to applications and...

View more
Is your company really prepared for a cyber attack? – Part 2
10 Month 09

Is your company really prepared for a cyber attack? – Part 2

Is your company really prepared for a cyber attack? – Part 2   In the previous article, we discussed the importance of digital transformation to...

View more
Build Your Own Network Performance Dashboard
08 Month 09

Build Your Own Network Performance Dashboard

Build Your Own Network Performance Dashboard   A network monitoring dashboard is one of the most important features within an all-inclusive network monitoring solution. A dashboard is...

View more
Ransomware Recovery
31 Month 08

Ransomware Recovery

The Relentless Onslaught of Ransomware Attacks are now occurring every 11 seconds, and demand for payments continue their upward trend with backup environments becoming a...

View more
Solutions for Big Data in Manufacturing
30 Month 08

Solutions for Big Data in Manufacturing

Why Manufacturers Need a Big Data Solution High-tech manufacturers are constantly looking for ways to increase efficiency, reduce costs, and streamline productivity, and their data...

View more
Protect and preserve your critical data ON QUANTUM
30 Month 08

Protect and preserve your critical data ON QUANTUM

Ensure the Availability of Your Production Data with Efficient Backup, Recovery, and Archive Solutions from Quantum The requirements for protecting data across the Enterprise continue...

View more
Record and analyze video surveillance data…On Quantum
26 Month 08

Record and analyze video surveillance data…On Quantum

Making the World Safer and Smarter with Surveillance and Analytics Surveillance recording and analytics are helping to make the world safer through loss prevention, access...

View more
NESSAR become an official distributor of Array Networks
24 Month 09

NESSAR become an official distributor of Array Networks

Nessar officially becomes a distributor of Array Networks products and solutions. Array Networks is a pioneer in providing a Network Functions platform that combines the...

View more
Hillstone’s Standalone SD-WAN Solution
23 Month 08

Hillstone’s Standalone SD-WAN Solution

Hillstone’s Standalone SD-WAN Solution The latest Hillstone Security Management Platform (HSM) release, version 5.0, expands upon previous versions to provide the first dedicated SD-WAN controller, manager and...

View more
Hillstone Security Management Platform
16 Month 08

Hillstone Security Management Platform

Accelerating Deployment Cycles. Reducing Management Overhead. Simplify Configuration. Hillstone’s Security Manager enhances network security by allowing businesses to segment their networks into multiple virtual domains....

View more
Hillstone Security Audit Platform (HSA)
16 Month 08

Hillstone Security Audit Platform (HSA)

Transform Log Data into Security Intelligence ISPs, universities, large enterprises, government agencies, and large data centers generate millions of events everyday. They require high performance...

View more
Hillstone ADC Solution
12 Month 08

Hillstone ADC Solution

Application Availability and Protection with Built-In Scalability Hillstone’s Application Protection products include an advanced application delivery controller (ADC) that helps scale the performance of your...

View more
Hillstone Server Protection Solution
12 Month 08

Hillstone Server Protection Solution

Comprehensive Server Protection with Unparalleled Visibility and Efficacy Hillstone Server Breach Detection System (sBDS) I-Series product line detects and helps mitigate advanced multi-stage, multi-layer, threats...

View more
Hillstone Cloud Protection
03 Month 08

Hillstone Cloud Protection

Hillstone Cloud Protection Easily Protect your Cloud Applications and Resources With the adoption of public clouds and increasing importance of virtualization, organizations need security solutions...

View more
Hillstone Edge Protection Solutions
03 Month 08

Hillstone Edge Protection Solutions

The First Line of Defense Multi-stage, Multi-layer Attacks Hillstone Edge Protection Solutions Reimagine Perimeter Defense For many corporations, the enterprise edge is the first line...

View more
Clustering and other Enhancements for Hillstone ADCs
29 Month 07

Clustering and other Enhancements for Hillstone ADCs

Clustering and other Enhancements for Hillstone ADCs Recently, Hillstone announced the release of its Application Delivery Controller (ADC) version 2.8. This release offers new models...

View more
Holm Security: 5 Steps to Successful Vulnerability Management
28 Month 05

Holm Security: 5 Steps to Successful Vulnerability Management

5 Steps to Successful Vulnerability Management Vulnerability Management is a cornerstone in a modern cyber security defense. But getting started and implementing a successful security...

View more
How to View WAN Applications in LiveNX
28 Month 09

How to View WAN Applications in LiveNX

How to View WAN Applications in LiveNX Wide-area networks (WAN) have undergone a great transformation over the past decade. An enabler of this evolution, cloud...

View more
A Programmer’s Perspective on Life, the Universe, and the Network
24 Month 09

A Programmer’s Perspective on Life, the Universe, and the Network

A Programmer’s Perspective on Life, the Universe, and the Network In Part 1, A Programmer’s Perspective on the Current State of Network Tools, we left off...

View more
How to View Sites, Devices, and Interfaces in LiveNX
14 Month 09

How to View Sites, Devices, and Interfaces in LiveNX

How to View Sites, Devices, and Interfaces in LiveNX   As the network grows more complex, it becomes clear that proper network monitoring software is...

View more
Build Your Own Network Performance Dashboard
08 Month 09

Build Your Own Network Performance Dashboard

Build Your Own Network Performance Dashboard   A network monitoring dashboard is one of the most important features within an all-inclusive network monitoring solution. A dashboard is...

View more
Getting Started with the LiveNX Network Monitoring Dashboard
23 Month 08

Getting Started with the LiveNX Network Monitoring Dashboard

Getting Started with the LiveNX Network Monitoring Dashboard IT teams are constantly inundated with alerts, requests, and a multitude of daily tasks to properly monitor...

View more
How To Identify Network Issues Hop-By-Hop
13 Month 08

How To Identify Network Issues Hop-By-Hop

How To Identify Network Issues Hop-By-Hop First, let’s define the problem. As networks get bigger they get more complicated. A pretty straightforward statement, but why...

View more
What Is a Network Packet?
23 Month 07

What Is a Network Packet?

What Is a Network Packet? Everything flowing through a network can be classified as part of data enclosed in a packet. A network packet or IP packet...

View more
How to Measure Network Performance Effectively
16 Month 07

How to Measure Network Performance Effectively

How to Measure Network Performance Effectively To run an enterprise effectively today, a good chunk of the yearly budget will have to be directed towards...

View more
OPSWAT Solutions now available in VMware Marketplace
06 Month 08

OPSWAT Solutions now available in VMware Marketplace

OPSWAT Solutions now available in VMware Marketplace As a leading provider of security solutions protecting the world’s most critical infrastructure, OPSWAT has built a network...

View more
Evolution of Infrastructure: From Data Centers to Containers
16 Month 07

Evolution of Infrastructure: From Data Centers to Containers

Evolution of Infrastructure: From Data Centers to Containers The impact of the digital transformation revolution requires organizations to look for more efficient solutions to manage,...

View more
Significant Enterprise Features Available in MetaDefender Cloud
05 Month 07

Significant Enterprise Features Available in MetaDefender Cloud

Significant Enterprise Features Available in MetaDefender Cloud MetaDefender Cloud platform has been servicing large enterprises for tens of thousands of active users monthly. OPSWAT is...

View more
WHEN SECURITY AND BUSINESS CONVERGE: MEET ED JOPECK
20 Month 01

WHEN SECURITY AND BUSINESS CONVERGE: MEET ED JOPECK

  Ed Jopeck is an accomplished national security professional. For nearly three decades, he has worked extensively with the U.S. government, starting as an analyst...

View more
Quantum Scalar Tape Libraries
21 Month 09

Quantum Scalar Tape Libraries

Data Protection & Long-Term Storage Are More Important Than Ever Tape has been used for decades to preserve and protect data, and today more than...

View more
Quantum StorNext Appliances and Block Storage Systems
21 Month 09

Quantum StorNext Appliances and Block Storage Systems

StorNext Appliances Overview Quantum offers a flexible range of appliances to host the StorNext File System in order to meet the unique needs of any...

View more
Quantum Solutions for Life Sciences
15 Month 09

Quantum Solutions for Life Sciences

Simplifying Petabyte-Scale Data Growth Advances in genomics sequencing, microscopy, and bioinformatics have made it possible for researchers to leverage data sets to develop vaccines, find...

View more
Protect and Retain Data at Scale
10 Month 09

Protect and Retain Data at Scale

Reduce Data Protection Cost by Over 50% File-based storage systems, such as scale-out NAS, have become more sophisticated, storing and delivering data to applications and...

View more
Ransomware Recovery
31 Month 08

Ransomware Recovery

The Relentless Onslaught of Ransomware Attacks are now occurring every 11 seconds, and demand for payments continue their upward trend with backup environments becoming a...

View more
Solutions for Big Data in Manufacturing
30 Month 08

Solutions for Big Data in Manufacturing

Why Manufacturers Need a Big Data Solution High-tech manufacturers are constantly looking for ways to increase efficiency, reduce costs, and streamline productivity, and their data...

View more
Protect and preserve your critical data ON QUANTUM
30 Month 08

Protect and preserve your critical data ON QUANTUM

Ensure the Availability of Your Production Data with Efficient Backup, Recovery, and Archive Solutions from Quantum The requirements for protecting data across the Enterprise continue...

View more
Record and analyze video surveillance data…On Quantum
26 Month 08

Record and analyze video surveillance data…On Quantum

Making the World Safer and Smarter with Surveillance and Analytics Surveillance recording and analytics are helping to make the world safer through loss prevention, access...

View more
Quantum ransomware
14 Month 10

Quantum ransomware

ULTIMATE RANSOMWARE RECOVERY WITH A BUILT-IN, OFF-NETWORK SECURE VAULT Quantum’s Tape Libraries with active vault software, a proven solution against modern cyberattacks. The threat of...

View more
What is the right way to detect OS by using SMB?
01 Month 10

What is the right way to detect OS by using SMB?

What is the right way to detect OS by using SMB?   After studying different vendors’ approaches, here is our summary of how to do...

View more
How to Use Microsoft SMB for OS Detection
28 Month 09

How to Use Microsoft SMB for OS Detection

The Study of Different Approaches from 4 Well-Known Vendors   You may wonder “how does a blackbox penetration test tool know about my server information...

View more
Operating System Fingerprint Recognition – Server Message Block (SMB)
14 Month 09

Operating System Fingerprint Recognition – Server Message Block (SMB)

Operating System Fingerprint Recognition – Server Message Block (SMB)   Whether you conduct penetration testing an automated vulnerability scanning, knowing your target is the very...

View more
Ridgesecurity: Stop HelloKitty and PrintNightmare with RidgeBot
26 Month 08

Ridgesecurity: Stop HelloKitty and PrintNightmare with RidgeBot

Stop HelloKitty and PrintNightmare with RidgeBot   In the cyberworld, HelloKitty is not a cute kitten. And PrintNightmare is an actual nightmare. HelloKitty is a ransomware group who used CVE-2020-3992 to exploit...

View more
Recently discovered Zimbra vulnerabilities may have compromised 200,000 companies
05 Month 08

Recently discovered Zimbra vulnerabilities may have compromised 200,000 companies

Recently discovered Zimbra vulnerabilities may have compromised              200,000 companies Zimbra, an open-source collaborative office suite, consisting of webmail, web...

View more
Ridge Security Announces Expanded Core Capabilities in RidgeBot with Enhanced Web Application Testing
23 Month 07

Ridge Security Announces Expanded Core Capabilities in RidgeBot with Enhanced Web Application Testing

Ridge Security Announces Expanded Core Capabilities in RidgeBot with Enhanced Web Application Testing From network, to host, to web applications, RidgeBot 3.5 delivers the most...

View more
The Past, Present, and Future of Pentesting
23 Month 07

The Past, Present, and Future of Pentesting

The Past, Present, and Future of Pentesting Pentesting, or penetration testing, is a cybersecurity measure that fights hackers by exposing the hacker’s possible entry points,...

View more
Understanding the Challenges, Risks and Best Practices for Securing APIs
02 Month 06

Understanding the Challenges, Risks and Best Practices for Securing APIs

Understanding the Challenges, Risks and Best Practices for Securing APIs Overview Most of today’s digital experiences are powered by APIs, however security remains a primary...

View more
China has Published Its Specific Law for the Protection of Personal Data. What Are the Implications?
01 Month 10

China has Published Its Specific Law for the Protection of Personal Data. What Are the Implications?

China has Published Its Specific Law for the Protection of Personal Data. What Are the Implications? Global efforts to ensure data protection have increased dramatically...

View more
The benefits of Using Cloud Computing
23 Month 09

The benefits of Using Cloud Computing

The benefits of Using Cloud Computing Cloud computing has been around for some time, and while data points to the efficiency, cost-effectiveness, and competitive advantages...

View more
The Biggest Cyberattacks of Recent Years
23 Month 09

The Biggest Cyberattacks of Recent Years

The Biggest Cyberattacks of Recent Years   We all know that cyber vulnerabilities are not a current issue. However, with the evolution of technology and virtualization growing...

View more
Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical
14 Month 09

Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical

Digital Sovereignty The Precepts of Senhasegura According to an American Periodical   Nomenclatures and acronyms are part of the routine of those who work in...

View more
Why is Data the New Oil?
14 Month 09

Why is Data the New Oil?

Why is Data the New Oil?   Performing any task today is much easier than it was a few years ago. With the evolution of...

View more
Why is Information Security Important to Your Organization?
10 Month 09

Why is Information Security Important to Your Organization?

Why is Information Security Important to Your Organization?   As technology becomes increasingly sophisticated, criminals’ skills often evolve as well, in many cases surpassing the...

View more
Is your company really prepared for a cyber attack? – Part 2
10 Month 09

Is your company really prepared for a cyber attack? – Part 2

Is your company really prepared for a cyber attack? – Part 2   In the previous article, we discussed the importance of digital transformation to...

View more
Senhasegura: The Pillars of Information Security – Part 2
19 Month 08

Senhasegura: The Pillars of Information Security – Part 2

The Pillars of Information Security – Part 2 Currently, the use of information is a great ally for companies from different industries. However, along with...

View more
China has Published Its Specific Law for the Protection of Personal Data. What Are the Implications?
01 Month 10

China has Published Its Specific Law for the Protection of Personal Data. What Are the Implications?

China has Published Its Specific Law for the Protection of Personal Data. What Are the Implications? Global efforts to ensure data protection have increased dramatically...

View more
The benefits of Using Cloud Computing
23 Month 09

The benefits of Using Cloud Computing

The benefits of Using Cloud Computing Cloud computing has been around for some time, and while data points to the efficiency, cost-effectiveness, and competitive advantages...

View more
The Biggest Cyberattacks of Recent Years
23 Month 09

The Biggest Cyberattacks of Recent Years

The Biggest Cyberattacks of Recent Years   We all know that cyber vulnerabilities are not a current issue. However, with the evolution of technology and virtualization growing...

View more
Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical
14 Month 09

Digital Sovereignty: The Precepts of Senhasegura According to an American Periodical

Digital Sovereignty The Precepts of Senhasegura According to an American Periodical   Nomenclatures and acronyms are part of the routine of those who work in...

View more
Why is Data the New Oil?
14 Month 09

Why is Data the New Oil?

Why is Data the New Oil?   Performing any task today is much easier than it was a few years ago. With the evolution of...

View more
Why is Information Security Important to Your Organization?
10 Month 09

Why is Information Security Important to Your Organization?

Why is Information Security Important to Your Organization?   As technology becomes increasingly sophisticated, criminals’ skills often evolve as well, in many cases surpassing the...

View more
Is your company really prepared for a cyber attack? – Part 2
10 Month 09

Is your company really prepared for a cyber attack? – Part 2

Is your company really prepared for a cyber attack? – Part 2   In the previous article, we discussed the importance of digital transformation to...

View more
Senhasegura: The Pillars of Information Security – Part 2
19 Month 08

Senhasegura: The Pillars of Information Security – Part 2

The Pillars of Information Security – Part 2 Currently, the use of information is a great ally for companies from different industries. However, along with...

View more
NESSAR VIETNAM TECHNOLOGIES JOINT STOCK COMPANY RECEIVED “ASEAN DISTRIBUTOR PARTNER OF THE YEAR 2023” SELECTED BY STELLAR CYBER
27 Month 03

NESSAR VIETNAM TECHNOLOGIES JOINT STOCK COMPANY RECEIVED “ASEAN DISTRIBUTOR PARTNER OF THE YEAR 2023” SELECTED BY STELLAR CYBER

Nessar Vietnam Technologies Joint Stock Company received “ASEAN Distributor Partner of the year 2023” selected by Stellar Cyber Hanoi, March 14, 2024 – Stellar Cyber...

View more
Starlight Open-XDR Platform
18 Month 01

Starlight Open-XDR Platform

TODAY’S CYBER SECURITY CHALLENGE    Cyberattacks and breaches are soaring and security budgets are growing in response. The industry needs a scalable, intelligent central platform...

View more
Stellar Cyber with John Peterson, Chief Product Officer
28 Month 06

Stellar Cyber with John Peterson, Chief Product Officer

Stellar Cyber with John Peterson, Chief Product Officer On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product...

View more