Công Ty Cổ Phần Công Nghệ Nessar Việt Nam - Nessar

Logo
En

Product

Post article posting products

Privilege Management Linux

Privilege Management Linux Restrict user privileges on Linux endpoints. What it is senhasegura.Go for Linux allows the execution of Run As function on local endpoints...

View more

DevOps and Secret Management

DevOps and Secret Management Senhasegura is fully compliant with DevOps environments. DevOps and Secret Management Currently, the software delivery pipeline is focused on delivering high...

View more

10 Key RidgeBot Features

10 Key RidgeBot Features Learn how enterprise customers achieve Risk-Based Vulnerability Management using RidgeBot’s automated penetration testing technology. These 10 key RidgeBot features provide an...

View more

Privilege Management for Windows Endpoints

Privilege Management for Windows Endpoints Restrict user privileges on Windows workstations. What it is Allows the execution of Run As feature on local workstations to...

View more

RidgeBot

RidgeBot Fully-Automated Penetration Testing Solution Ridge Security has changed penetration testing with RidgeBot™, a fully automated intelligent security validation robot Penetration testing, even with current...

View more

Application Identity

Application Identity Eliminate hard-coded passwords and identify privileged accesses. What it is It’s possible to delete credentials embedded in source codes, scripts and configuration files,...

View more

A10 Carrier-Grade Networking & IPV6 Migration (CGN)

The most advanced carrier-grade networking solution, A10 Thunder® CGN provides high-performance, highly transparent network address and protocol translation that allows service providers and enterprises to...

View more

A10 Networks Thunder Convergent Firewall (CFW)

A10 Networks Thunder Convergent Firewall (CFW) is the industry’s first security solution that incorporates multiple security functions for enterprise and service provider deployments, including highly...

View more

A10 Thunder SSLi (SSL Insight)

SSL Insight SSL Insight is a comprehensive SSL/TLS decryption solution that enables your security devices to efficiently analyze all enterprise traffic while: Eliminating the blind...

View more

A10 Thunder ADC (Application Delivery Controller) Product

Thunder® ADC (Application Delivery Controller) is a high-performance solution that enables customer applications to be highly available, accelerated and secure.

View more

A10 Thunder TPS product

The industry highest-performance automated DDoS protection- A10 Networks’ Thunder® Threat Protection System (TPS)

View more

Education

Education ACTi solutions cannot only effectively deter crimes but also detect misbehavior, such as fight and bullying, at educational locations using machine learning. Prompt reporting...

View more

Commercial Building

Commercial Building ACTi commercial building end-to-end solutions automate your building maintenance and security management using smart building technologies. The solutions are able to integrate surveillance,...

View more

Banking

Banking Solution ACTi offers you the end-to-end solutions for maximizing banking security and customer loyalty. With the help of the integration of intelligent video analytics,...

View more

ACTi RAS-101

RAS-101 10-Channel Standalone Market Application Suite for Retail Application Total Traffic Performance vs Weather Total Traffic Performance vs Gender/Age Total Traffic Performance vs Weather vs...

View more

ACTi RAS-100

RAS-100 100-Channel Standalone Market Application Suite for Retail Application Total Traffic Performance vs Weather Total Traffic Performance vs Gender/Age Total Traffic Performance vs Weather vs...

View more

ACTi IPS-100

IPS-100 Standalone Market Application Suite Event real-time monitoring in forbidden zone to detect illegally parked vehicle, and trigger the alarm notification along with detected license...

View more

Aerohive SR2224P

The SR2224P is an entry level access switch offering simple wiring closet expansion along with ease of management and scalability

View more

Aerohive XR600P

Cloud-Managed Mid-Enterprise SD-WAN Router with Gigabit PoE+ Ethernet

View more

Aerohive Router XR200P

Powered by HiveOS, the XR200P delivers cloud-managed SD-WAN routing for distributed organizations, extending unified, enterprise connectivity to any location.

View more

Aerohive ATOM AP30

Industry-first Pluggable Enterprise Wi-Fi Access Point and Sensor

View more

Aerohive AP650X

Enterprise-grade 4x4, 4-stream, 802.11ax Access Point with External Antennas

View more

Aerohive AP630

Enterprise-Grade 4x4, 4-stream, 802.11ax Access Point with Integrated Antennas

View more

ARISTA EOS

Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry standard CLI and runs a single binary software image...

View more

ARISTA CLOUDVISION

CloudVision® extends the same architectural approach across the network with a state-based view of the entire network, across private, public and hybrid clouds.

View more

Switch Arista 7280SR-48C6 product

The Arista 7280SR-48C6 Switch is a  Access Switch product  that has  big buffer for video applications.

View more

Arista Switch 7500R Product

Switch Arista 7500R is  Modular  Switch with very high performance Core Data Center

View more

Arista Switch 7300 Product Series

Switch Arista 7300 Series is  Modular  Switch with  high performance Core Data Center

View more

Arista Switch 7150S -64 Product

The Arista 7150S-64 Switch is a  Access Switch product  that has low latency for real time services

View more

Array AG1500FIPS

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1500FIPS is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1600V5

Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1600V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1500V5

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1500V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1200V5

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1200V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1100V5

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1100V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1000V5

Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1000V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Data Center Access System

Access control system that offers superior reliability, flexible implementation and enhanced management for maximum security at the cabinet and room level. BENEFITS FEATURES BENEFITS Produce...

View more

CAT 6A Cable

Our Category 6A Copper Cable offers a wide range of options for your CAT 6A network. Some options that are available include small diameter, non-bonded,...

View more

Multi-Media Cabinets

With multiple enclosure footprints to better suit your space and application needs, the XM Series is ideal for Security, Broadband, Enterprise Networking and Data Center...

View more

Networking and Switch Cabinets

Belden’s XHS Series are designed to support high load capacities and proper airflow management. They offer modular and scalable system that adapts to changing requirements...

View more

Server Cabinets

XS Series server cabinets are designed for high density server hosting. Load capacity of 3000 lbs coupled with wide folio of accessories allows project specific...

View more

CAT 6A Plugs

Category 6A Field Mount Plugs are available in UTP and shielded and are color-coded 568 A/B for universal wiring. They come equipped with an Insulation...

View more

Dragon RMM

RMM Definition RMM or network management software is a type of remote IT management software used by Managed IT Service Providers (MSPs) to remotely monitor...

View more

Dragon AEP: Advanced Endpoint Breach Protection

Endpoint Security Benefits While unknown files are in containment, the files are immediately analyzed in the cloud by Comodo’s Valkyrie Verdicting Engine and Threat Intelligence...

View more

Service Desk

Service Desk A service desk is the single point of contact (SPOC) between the service provider (IT) and users for everyday activities. A typical service...

View more

Dragon XDR: Cloud Workload Protection

Comodo XDR: eXtended Detection and Response : Discovering Unknowns, Revealing Hidden Threats Where Comodo Engineering Talks Comodo XDR: eXtended Detection and Response : Discovering Unknowns,...

View more

Dragon Secure Email Gateway

SECURE EMAIL FILTERING – INSTANT BUSINESS BENEFITS Comodo’s sophisticated filtering system and containment solution is designed to keep unwanted email from ever entering your network....

View more

CUBRO MEDIA CONVERTER SFP

Datasheet Product description

View more

BREAKOUT BOXES

Datasheet Product description

View more

COPPER BYPASS

Datasheet Product description

View more

COOPER TAPS – FlexTAP T-100

Datasheet Product description

View more

Hillstone S5560

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S3860

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S3560

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S2660

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S2160

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S1560

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

LiveNX Enterprise Network Monitoring Software Platform

Next Generation Enterprise Network Monitoring Software LiveNX is the only network performance platform with the scale and power to optimize your entire network.   Unify...

View more

LiveNA Network and Application Anomaly Detection

AIOps for Enterprise Network Monitoring LiveNA uses Artificial Intelligence and Machine Learning to provide expert insights to application and network performance. Application Performance Optimization Baseline...

View more

LiveSP Network Monitoring for Service Providers

Solutions Delivery and Assurance for SP LiveSP network monitoring and reporting platform helps suppliers deliver value-added services to their customers. Collect Data from an Unlimited...

View more

LiveCapture Packet Capture and Analysis

Optimize the Performance of Your Remote Network Quickly troubleshoot and resolve poor application performance at branch offices, WAN links, and data centers.   Capture Packets...

View more

LiveAction Omnipeek Network Protocol Analyzer

World’s Most Powerful Network Protocol Analyzer Omnipeek empowers you with rapid-fire analytics and insights so you can make the best decisions, quickly,about your network speed,...

View more

LiveWire – Extend Network Monitoring

Optimize Application Performance at Remote Sites, WAN edge, and Data Centers LiveWire supports quickly troubleshoot and resolve poor application performance at remote sites, WAN edge,...

View more

Pivot3 X5-6000s

Reduce costs and complexity by consolidating multiple applications, including mission critical, on a common infrastructure. With a multi-tier architecture powered by NVMe flash and optimized...

View more

Pivot3 X5-6000

Reduce costs and complexity by consolidating multiple applications, including mission critical, on a common infrastructure. With a multi-tier architecture powered by NVMe flash and optimized...

View more

Pivot3 X3-2000s

Reduce costs and complexity by consolidating multiple applications, including mission critical, on a common infrastructure. With a multi-tier architecture powered by NVMe flash and optimized...

View more

Pivot3 X3-2000

Reduce costs and complexity by consolidating multiple applications, including mission critical, on a common infrastructure. With a multi-tier architecture powered by NVMe flash and optimized...

View more

Pivot3 X5-2000s

Reduce costs and complexity by consolidating multiple applications, including mission critical, on a common infrastructure. With a multi-tier architecture powered by NVMe flash and optimized...

View more

Pivot3 X5-2500

Reduce costs and complexity by consolidating multiple applications, including mission critical, on a common infrastructure. With a multi-tier architecture powered by NVMe flash and optimized...

View more

10 Key RidgeBot Features

10 Key RidgeBot Features Learn how enterprise customers achieve Risk-Based Vulnerability Management using RidgeBot’s automated penetration testing technology. These 10 key RidgeBot features provide an...

View more

RidgeBot

RidgeBot Fully-Automated Penetration Testing Solution Ridge Security has changed penetration testing with RidgeBot™, a fully automated intelligent security validation robot Penetration testing, even with current...

View more

Privilege Management Linux

Privilege Management Linux Restrict user privileges on Linux endpoints. What it is senhasegura.Go for Linux allows the execution of Run As function on local endpoints...

View more

DevOps and Secret Management

DevOps and Secret Management Senhasegura is fully compliant with DevOps environments. DevOps and Secret Management Currently, the software delivery pipeline is focused on delivering high...

View more

Privilege Management for Windows Endpoints

Privilege Management for Windows Endpoints Restrict user privileges on Windows workstations. What it is Allows the execution of Run As feature on local workstations to...

View more

Application Identity

Application Identity Eliminate hard-coded passwords and identify privileged accesses. What it is It’s possible to delete credentials embedded in source codes, scripts and configuration files,...

View more

SSH Key Management

SSH Key Management Securely control the SSH key cycle. What it is Secure storage, rotation and access control for SSH key protection. Benefits Blocking unauthorized...

View more

SaaS Access Management (PAM)

SaaS Access Management Fast and easy protection of privileged access. The compliance with current standards and regulations (LGPD; DGPR; PCI DSS; ISA 62443; among others)...

View more

Stellar Cyber Starlight Appliance

Stellar Cyber Starlight Appliance Starlight Appliance is a high performance software & hardware appliance that serves as a Unified Security Analytics Platform for SOC teams...

View more

Stellar Cyber Photon Sensor – 10G

Photon Sensor – 10G The Photon Sensor is a network sensor that can monitor 10 LAN segments at an aggregated throughput of 1 gigabit per...

View more

Stellar Cyber Photon Sensor – 1G

Photon Sensor – 1G The Photon Sensor enables organizations to gain unprecedented visibility into network security events. By solving the “Goldilocks” problem, our sensors collect...

View more

Product & Technology of Stellar Cyber

With Stellar Cyber, your dream of AI driven breach detection becomes reality.

View more

Starlight Product Tour

Starlight Product Tour

View more

FREQUENTLY ASKED QUESTIONS

Synthesize the most frequently asked questions for customers as well as consultants

TYPICAL CUSTOMERS