Protect More
Be protected from threats, including system- and memory-based attacks, malicious documents, zero-day malware, privilege escalations, scripts and potentially unwanted programs.

Impact Less
Boost the efficiency of IT resources and reduce user impact throughout your organization with endpoint security products that use very little memory, less than 1% of CPU and require no Internet connection or signature updates.

Stay Flexible
Secure your entire infrastructure with one solution that works across Microsoft Windows® and Mac OS X, easily integrates into existing SIEM platforms, and is available in OEM and embedded versions for technology partners



For More Information:  Click Here.


Digital Guardian (formerly Code Green)

Digital Guardian is a complete Data Loss Prevention (DLP) solution that allows companies to effectively discover, monitor, control, and secure sensitive data, whether on the network, in use on desktops or laptops, or at rest on end-user devices and network servers.



For More Information:  Click Here.



For three decades, PKWARE has provided encryption and compression software to more than 30,000 enterprise customers, including 200 government entities. Inventor of the .ZIP file, PKWARE's easy-to-use security solutions armor the data itself and eliminate vulnerabilities wherever data is used, shared, and stored.

PKWARE's Smartcrypt is an enterprise encryption and key management solution that provides persistent data protection for sensitive information and visibility into where it is being used, shared, and stored. Available for every operating system - from mainframe to mobile - Smartcrypt secures sensitive information in files and databases, and allows enterprises to securely exchange data - even with customers and partners - and retain control even after data leaves the organization.



For More Information:  Click Here.



Thycotic, a global leader in IT security, is the fastest growing provider of Privilege Management solutions that protect an organization’s most valuable assets from cyber-attacks and insider threats. Thycotic secures privileged account access for more than 7,500 organizations worldwide, including Fortune 500 enterprises. Thycotic’s award winning Privilege Management Security solutions minimize privileged credential risk, limit user privileges, and control applications on endpoints and servers. Thycotic was founded in 1996 with corporate headquarters in Washington, D.C. and global offices in the U.K. and Australia.



For More Information:  Click Here.



Armis is an agentless IoT security platform that lets enterprises see and control any device or network. Discover all the devices in your environment, even before they join the network. Automatically identify and disconnect unmanaged devices from the network. Deploys in minutes. Integrates with existing infrastructure. Armis protects business from unmanaged, compromised or rogue devices and networks. Using an agentless approach, Armis discovers, monitors and provides visibility to all devices – even before they connect with the network, including monitoring and controlling all outside connections from corporate assets.



For More Information:  Click Here.



Mimecast – Unified Email Management with no Complexity and Less Cost

Mimecast provides email management as a single service in the cloud that helps you slash on-premise email storage requirements, ensure complete email availability, email security and email compliance, while providing services to help you get more from your email. We call it "Unified Email Management".



For More Information:  Click Here.



• Understanding your data accurately is the foundation of your sensitive data protection strategy and helps you determine where to apply your data security controls. But once you understand your data, you need to properly classify it. Without security classification, an organization treats all data as if it were the same: You can't know the level of importance of any data because it hasn't been properly classified. Spirion Data Platform's automated persistent data classification software simplifies what until now has been a costly and resource-intensive exercise.



For More Information:  Click Here.


CoSoSys Endpoint Protector

Finally, an out-of-the box solution to secure sensitive data from threats posed by portable storage devices, cloud services and mobile devices. Endpoint Protector for Windows, Mac and Linux provides device control, content aware protection, mobile device management and enforced encryption of removable media, all managed from a single console contained in a physical or virtual environment. Suitable for any size network, EPP can be used by small, medium and enterprise customers.



For More Information:  Click Here.



Email Encryption, Email Data Loss Prevention and Mobile Device Email Management



For More Information:  Click Here.



Safend is a leading provider of endpoint data protection software. Their products protect against corporate data loss by offering comprehensive data encryption, port control, device control and content inspection, ensuring compliance with regulatory data security and privacy standards. Safend's products encrypt internal and external hard drives, removable storage devices and CD/DVDs; provide granular port and device control over all physical, wireless and removable media devices; and control sensitive data transferred over endpoint and network channels. With more than 1,800 customers worldwide and 2.5 million licenses sold, Safend's software is deployed by multinational enterprises, government agencies, healthcare organizations, and small to mid-size companies across the globe.



For More Information:  Click Here.



LogRhythm provides useful and actionable visibility into what is really going on in and around the enterprise. Award-winning and patented Log Management, SIEM 2.0 and File Integrity Monitoring solutions enable customers to efficiently comply with regulations, secure their networks and optimize the availability of their IT infrastructure. LogRhythm leads the industry with complete solutions that are easy to deploy, use, scale and maintain.

LogRhythm establishes a new and higher standard in log management and security information and event management (SIEM). At its core is the ability to collect log data from any source and make it useful for comprehensive visibility and awareness into the entire IT environment. Valuable data enrichment and advanced data management provide organizations with:

* Fast and Effective Correlation

* Real-time Alarming

* Flexible and Powerful Reporting

* Advanced Forensic Analysis

LogRhythm is operated and managed through an easy-to-use and individually customizable console. Fully-interactive visualization tools and context-aware event management deliver powerful capabilities for protecting the network and reducing Mean-time-to-resolution. Flexible deployment and configuration options combined with intuitive, wizard-based features and comprehensive compliance support mean LogRhythm delivers unparalleled log management and SIEM 2.0 for today's compliance, security and IT operations professionals.



For More Information:  Click Here.



Enow's Mailscape® is a unique and innovative systems management tool that assists in every aspect of monitoring, maintaining, load balancing and reporting across you r entire Exchange environment.®

Its unique digital dashboard provides real-time status and alerting across all t he vital aspects of your Exchange organization, enabling you to take aversive action and maintain optimum service levels according to site-defined thresholds.

View up-to-date status and reports and receive alerts wherever you are - even from your PDA.

Mailscape's advanced reporting (now includes over 200 standard reports plus the ability to create your own) lets you drill down into the details of your environment, including mailbox status, database loading, storage usage, white space status, service pack levels, external mail flow monitoring, etc.

Mailscape also lets you generate high-level management reports to support email service expansion, consolidation and upgrade decisions.

* Saves time by streamlining administrative, monitoring and maintenance tasks.

* Alerts you to problems before your users do.

* Monitors storage availability, white space growth & overall rate of growth

* Monitors message queues & sends alerts if critical services stop.

* Reports on mailboxes in a warning, prohibit send, or locked out state.

* Quickly generates reports that detail mailboxes per server/storage group/OU/database.

Mobile 'Phone Monitoring - Mailscape for monitoring the health and availability of your mission-critical mobile 'phone services, including BlackBerryand iPhone, is available now.



For More Information:  Click Here.


Network Box - Managed Security Solutions

Our Philosophy

Internet threats to Network security are a global phenomenon, which is why Network Box has established operations centres around the world. With headquarters in Hong Kong and regional operations centres in Europe, Australasia, America and Asia we 'follow the sun', twenty four hours a day, seven days a week to ensure our products are kept up to date against the very latest internet security threats.

Location of Network Box Operation Centres

Location of Network Box Operation Centres

Our Mission

To make effective Internet security available and affordable to enterprises of all sizes.

What We Do

Our flagship product is a range of the Internet Threat Prevention and Security devices. Available in a number of hardware options to accommodate different network types and sizes, each remotely managed, Network Box seamlessly integrates all its threat prevention applications into a single, sophisticated, user friendly service. So by installing a Network Box your company can become automatically protected against the latest viruses, hackers, worms, backdoors and other online menaces, easily, effortlessly and cost-effectively.

Our Service

Each Network Box is continuously monitored and managed for optimum performance by our Operations centres. So not only do we configure and install each device for you, but, on the rare occasions when we cannot fix a problem remotely, we can arrange a prompt repair or replacement of your Network Box.



For More Information:  Click Here.



Revolutionizing Data Protection and Storage

CTERA™ Networks revolutionizes storage and data protection for SMBs and branch offices with Cloud Attached Storage, a hybrid solution that combines secure cloud storage services with on-premises storage appliances for a seamless user experience.

Cost-Effective, Reliable Data Protection

Current solutions for data storage and data protection - such as file servers and backup tape drives - are unnecessarily expensive, unreliable, and prone to human error. Particularly in small businesses, branch office and SOHO setups, where knowledgeable IT staff are typically in short supply and backup procedures are often non-existent, there is a real need for a cost-effective, all-in-one solution for centralized storage and secure off-site data protection.

Cloud Attached Storage by CTERA is the answer to the storage and data protection woes of small businesses, SOHO and branch offices. Integrating reliable cloud storage with small form-factor Network Attached Storage (NAS) appliances, Cloud Attached Storage provides much needed reliability and storage flexibility, bundled as an easy-to-use, remotely managed storage service.

CTERA Networks is a privately held company, backed by Benchmark Capital.



For More Information:  Click Here.


Website Design and Hosting by White Buck Media and Hosting