Công Ty Cổ Phần Công Nghệ Nessar Việt Nam - Nessar

Logo
En

Product

Post article posting products

Hillstone S-Series Network Intrusion Prevention System (NIPS)

Network-based IPS Appliance Operating in-line at Wire Speed Hillstone S-Series plays an integral part of network security systems for its high-performance, no compromise, best-of-breed protection...

View more

Hillstone T-Series Intelligent Next-Generation Firewalls (iNGFW)

Bringing the Power of AI to the Firewall. T-Series intelligent next-generation firewalls are capable of detecting unknown malware and abnormal behavior. With a rich forensic...

View more

Hillstone E-Series Next-Generation Firewalls (NGFW)

The E-Series Provides Granular Application Control with Comprehensive Threat Detection and Prevention. Enterprise-Grade Firewalls Hillstone E-Series next generation firewall is design for the specific function...

View more

Hillstone X-Series Data Center Next-Generation Firewalls

The Hillstone X Series Data Center Firewall offer outstanding performance, reliability, and scalability, for high-speed service providers, large enterprises and carrier networks. The products are...

View more

Cable Runways

Belden cable runways and accessories speed up deployment time and maximize space usage. Designed to optimize cable bandwidth and provide for maximum cabling density. BENEFITS...

View more

Fiber Distribution Cable

Belden’s tight-buffered multi-fiber distribution cables are available in fiber counts from 2 to 144. These highly popular cables are designed for both indoor & indoor/outdoor...

View more

Education

Education ACTi solutions cannot only effectively deter crimes but also detect misbehavior, such as fight and bullying, at educational locations using machine learning. Prompt reporting...

View more

Commercial Building

Commercial Building ACTi commercial building end-to-end solutions automate your building maintenance and security management using smart building technologies. The solutions are able to integrate surveillance,...

View more

Banking

Banking Solution ACTi offers you the end-to-end solutions for maximizing banking security and customer loyalty. With the help of the integration of intelligent video analytics,...

View more

ACTi RAS-101

RAS-101 10-Channel Standalone Market Application Suite for Retail Application Total Traffic Performance vs Weather Total Traffic Performance vs Gender/Age Total Traffic Performance vs Weather vs...

View more

ACTi RAS-100

RAS-100 100-Channel Standalone Market Application Suite for Retail Application Total Traffic Performance vs Weather Total Traffic Performance vs Gender/Age Total Traffic Performance vs Weather vs...

View more

ACTi IPS-100

IPS-100 Standalone Market Application Suite Event real-time monitoring in forbidden zone to detect illegally parked vehicle, and trigger the alarm notification along with detected license...

View more

Array AG1500FIPS

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1500FIPS is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1600V5

Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1600V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1500V5

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1500V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1200V5

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1200V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1100V5

​Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1100V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

Array AG1000V5

Powered by Array’s SpeedCore® 64-bit architecture, the Array AG1000V5 is the ideal choice for businesses and service providers looking for flexible and scalable secure access...

View more

CUBRO MEDIA CONVERTER SFP

Datasheet Product description

View more

BREAKOUT BOXES

Datasheet Product description

View more

COPPER BYPASS

Datasheet Product description

View more

COOPER TAPS – FlexTAP T-100

Datasheet Product description

View more

Hillstone CloudView

Hillstone CloudView Cloud-Based Security Management and Analytics Platform Real-Time Centralized Monitoring Hillstone CloudView is a cloud-based security management and analytics platform which provides SaaS security...

View more

Hillstone S5560

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S3860

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S3560

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S2660

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Hillstone S2160

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System...

View more

Phishing simulation & awareness training

Phishing simulation & awareness training Over 90 % of data breaches start with a malicious email. Do you know how your users will respond to the next attack? Our product for phishing simulation and awareness training helps you increase resilience...

View more

Web Application Scanning

Web Application Scanning Gartner states that 75% of the attacks occur in the application layer, which makes web applications the most vulnerable layer in your...

View more

System And Network Scanning

System And Network Scanning Our automated and continuous system and network scanner provides unparalleled coverage and comprehensive insight to enable you to detect vulnerabilities, assess...

View more

LiveNX Enterprise Network Monitoring Software Platform

Next Generation Enterprise Network Monitoring Software LiveNX is the only network performance platform with the scale and power to optimize your entire network.   Unify...

View more

LiveNA Network and Application Anomaly Detection

AIOps for Enterprise Network Monitoring LiveNA uses Artificial Intelligence and Machine Learning to provide expert insights to application and network performance.   Application Performance Optimization...

View more

LiveSP Network Monitoring for Service Providers

Solutions Delivery and Assurance for SP LiveSP network monitoring and reporting platform helps suppliers deliver value-added services to their customers. Collect Data from an Unlimited...

View more

LiveCapture Packet Capture and Analysis

Optimize the Performance of Your Remote Network Quickly troubleshoot and resolve poor application performance at branch offices, WAN links, and data centers.   Capture Packets...

View more

LiveAction Omnipeek Network Protocol Analyzer

World’s Most Powerful Network Protocol Analyzer Omnipeek empowers you with rapid-fire analytics and insights so you can make the best decisions, quickly,about your network speed,...

View more

LiveWire – Extend Network Monitoring

Optimize Application Performance at Remote Sites, WAN edge, and Data Centers LiveWire supports quickly troubleshoot and resolve poor application performance at remote sites, WAN edge,...

View more

OWASP Top 10 Compliance with RidgeBot 3.6

OWASP Top 10 Compliance with RidgeBot 3.6   What is OWASP Top 10? Security breaches and attacks have become so prevalent that only the very...

View more

Ridge Security Automated Penetration Testing Solution Delivers Advanced Post-Exploitation Techniques

https://youtu.be/DzYvgEPqKCY Ridge Security Automated Penetration Testing Solution Delivers Advanced Post-Exploitation Techniques   Ridge Security helps you stay on the front lines of cyber defense with...

View more

10 Key RidgeBot Features

10 Key RidgeBot Features   Learn how enterprise customers achieve Risk-Based Vulnerability Management using RidgeBot’s automated penetration testing technology. These 10 key RidgeBot features provide...

View more

RidgeBot

RidgeBot Fully-Automated Penetration Testing Solution Ridge Security has changed penetration testing with RidgeBot™, a fully automated intelligent security validation robot Penetration testing, even with current...

View more

PAMaturity

PAMaturity Find out your PAM maturity level. We at senhasegura take Privileged Access Management (PAM) seriously. And we want to bring all of our PAM...

View more

PAM 360º

PAM 360º Our process for privileged credential management. PAM 360º is an advisory process developed by senhasegura that identifies an organization’s maturity level in terms...

View more

PAM Advanced Monitoring

PAM Advanced Monitoring Full monitoring of the senhasegura solution. What it is Monitoring of senhasegura operation aspects and its components. Benefits Operational gain in the...

View more

PAM Load Balancer

PAM Load Balancer Optimal usage of senhasegura resources.   What it is Integrated load balancing solution, which monitors various aspects of senhasegura Cluster and performs...

View more

Local User Provisioning

Local User Provisioning Create and manage local users centrally.   What it is Provisioning and revocation of privileged local user access on Windows, Linux and...

View more

Certificate Management

Certificate Management Automatic and centralized digital certificate management. What it is Centralized management of digital certificates lifecycle within the organization, from discovery through automatic scanning...

View more

Stellar Cyber Starlight Appliance

Stellar Cyber Starlight Appliance Starlight Appliance is a high performance software & hardware appliance that serves as a Unified Security Analytics Platform for SOC teams...

View more

Stellar Cyber Photon Sensor – 10G

Photon Sensor – 10G The Photon Sensor is a network sensor that can monitor 10 LAN segments at an aggregated throughput of 1 gigabit per...

View more

Stellar Cyber Photon Sensor – 1G

Photon Sensor – 1G The Photon Sensor enables organizations to gain unprecedented visibility into network security events. By solving the “Goldilocks” problem, our sensors collect...

View more

Product & Technology of Stellar Cyber

With Stellar Cyber, your dream of AI driven breach detection becomes reality.

View more

Starlight Product Tour

Starlight Product Tour

View more

SuperBlade

SuperBlade – Highest Density x86 Multi-Node Server for Enterprise Cloud, HPC Applications Enclosure detail > Enclosure detail > Enclosure detail >

View more

Networking Switches

ONIE-Enabled Switches More details > More details > More details > More details > More details > More details > More details > Standard Ethernet...

View more

Twin Server Solutions

Twin Server Solutions Innovative Multi – node Architecture with Reduced TCO and TCE. 2U2N BigTwin with PCIe 5.0 Flagship Multi-Node Performance for the Most Demanding...

View more

Multi Processor Systems

Multi Processor Systems Extremely Large In – Memory Computing and Mission Critical Applications.

View more

Single Processor Rackmounts

Single Processor Rackmounts The industry’s broadest portfolio of single processor rackmount servers providing cost – effective, yet powerful choices for cloud and enterprise workloads. X13/H13...

View more

2U Dual Processor Rackmounts

2U Dual Processor Rackmounts The industry’s broadest portfolio of performance optimized dual processor servers to match your specific workload requirements. X13/H13 HYPER WITH PCIE 5.0...

View more

FREQUENTLY ASKED QUESTIONS

Synthesize the most frequently asked questions for customers as well as consultants

TYPICAL CUSTOMERS