Comguard Infosol Private Limited
Comguard Infosol Private Limited
Kapurbawdi, Mumbai, Maharashtra
SEND SMS
SEND EMAIL

IT Security

Our range of products include ip camera and dual band iot gateway, acunetix, sentry ems encrypted flash drive, array networks, dl3 configurator and kaspersky antivirus software.

IP Camera and Dual Band IoT Gateway

IP Camera and Dual Band IoT Gateway
  • IP Camera and Dual Band IoT Gateway
Ask For Price
EBK1000
EnGuardian Kit with HD720P IP Camera and Dual Band IoT Gateway
  • Monitor Your Home, Family and Pets
  • Keep An Eye on Your Business
  • Alerts Sent to Smartphones and Tablets
  • Integrated Alarm That Can Be Connected to a Sound System or Loudspeaker
  • Schedule or Instantly Record and Archive Video
Request
Callback
Yes! I am Interested

Acunetix

Acunetix
  • Acunetix
Ask For Price

As many as 70% of websites have vulnerabilities that couldlead to the theft of sensitive corporate data such as credit card informationand customer lists. Hackers are concentrating their efforts on web-basedapplications - shopping carts, forms, login pages, dynamic content, etc.Accessible 24/7 from anywhere in the world, insecure web applications provideeasy access to backend corporate databases and also allow hackers to perform illegalactivities using the compromised site.

Web application attacks, launched on port 80/443, gostraight through the firewall, past the operating system and network levelsecurity, and right into the heart of your application and corporate data.Tailor-made web applications are often insufficiently tested, have undiscoveredvulnerabilities and are therefore easy prey for hackers.

Find out if your website is secure before hackers download sensitivedata, launch criminal activity from your website and endanger your business.Acunetix Web Vulnerability Scanner (WVS) crawls your website, automaticallyanalyzes your web applications and finds perilous SQL injection, Cross-SiteScripting and other vulnerabilities that expose your online business. Concise reportsidentify where web applications need to be fixed, thus enabling you to protectyour business from impending hacker attacks!

More Advanced Features
?? Automatic Custom 404 Error Page & rewrite rule identification.
?? HTTP Parameter Pollution (HPP) vulnerability detection.
?? Supports custom HTTP headers in automated scans.
?? Supports multiple HTTP authentication credentials.
?? Support for CAPTCHA, Single Sign-On and Two Factor authentication mechanisms.
?? Customize list of false positives & script custom web attacks.
?? Automate File Upload Forms vulnerability testing.
?? Locates CRLF injection, Code execution, Directory Traversal, File inclusion, Google Hacking Database and Authentication vulnerabilities.
?? Scanning profiles to scan websites with different scan options and identities.
?? Compare scans and find differences with previous scans.
?? Easily re-audit vulnerability fixes with rescan functionality.
Request
Callback
Yes! I am Interested
View PDF

Sentry EMS Encrypted Flash Drive

Sentry EMS Encrypted Flash Drive
  • Sentry EMS Encrypted Flash Drive
Ask For Price
Combining hardware encryption with plug and play simplicity.
DataLocker Sentry EMS drive is a 256-bit AES encrypted USB 3.0 flash drive that delivers ultimate portability and security.
Request
Callback
Yes! I am Interested

Array Networks

Array Networks
  • Array Networks
Ask For Price
Proven in over 5000 worldwide customer deployments, Array Networks is a global leader in application delivery networking.
Powered by Speed CoreTM, Array application delivery, cloud and mobility solutions are recognized by leading enterprise, service provider and public sector organizations for unmatched performance, reliability and total-value-of-ownership.

The Array ADN Advantage:
In today's world of mobile and cloud computing, applications reside in data centers around the globe, and interact with us wherever we go. Supporting many users in many locations on many devices - while maintaining application performance, availability and security - can be costly and complex.
Array Networks helps enterprises, service providers and public sector organizations meet the challenges of delivering applications in these dynamic network environments. Our application delivery WAN optimization and secure access solutions provide the tools essential to maintaining a seamless end-user experience while simultaneously preventing attacks and data leakage.
Request
Callback
Yes! I am Interested

DL3 Configurator

DL3 Configurator
  • DL3 Configurator
Ask For Price
The DataLocker Configurator is a program that allows an administrator to rapidly configure and deploy DL3 units for an organization. Create and save security policies and protocols and rapidly set-up your user's individual DL3 devices.
Request
Callback
Yes! I am Interested

Kaspersky Antivirus Software

Kaspersky Antivirus Software
  • Kaspersky Antivirus Software
Ask For Price
OUR ULTIMATE SECURITY & SYSTEMS MANAGEMENT SOLUTION
  • Protects against known, unknown & advanced threats
  • Secures laptops, desktops, servers & mobile devices
  • Identifies vulnerabilities & distributes patches
  • Delivers extended systems management capabilities
  • Secures your Web gateway, email & collaboration
Request
Callback
Yes! I am Interested

Content Keeper

Content Keeper
  • Content Keeper
Ask For Price
ContentKeeper provides powerful Web ???ltering solutions to secure network gateways and cloud- based business and education resources.  Secure Internet Gateway is a revolution in Web ???ltering and Internet threat security. It uni???es a range of best-of-breed technologies into a single, versatile,  easy  to  manage  solution  -  with  seamlessly  integrated  mobile  device  ???ltering,  policy- based  user  controls  and  cohesive  reporting.  Secure Internet Gateway provides ultra-fast real- time Web content classi???cation coupled with the very latest in proactive anti-malware behavioral assessment technology. The result is an airtight Internet ???ltering and protection solution which can intelligently identify new/unknown Web content or uniquely targeted threats on-the-???y.

Web Filtering:

ContentKeeper Secure Internet Gateway automatically maintains a safe and productive work or study environment. ContentKeeper ensures no harmful or offensive content is accessible to users via a comprehensive Website category database, dynamic Web content classi???cation and application controls.

Advanced Threat Protection:

Secure Web Gateway is a multifaceted anti-malware and malicious Web threat security system. It combines three layers of advanced malware identi???cation technology to provide a total barrier against Web threats. Proactive Web-Based Malware Security:  ContentKeeper Advanced Threat Protection Suite is a multifaceted anti-malware and malicious Web threat security system. It combines multiple advanced targeted malware identi???cation technologies to provide a total barrier against today’s and tomorrow’s Web security threats.
Request
Callback
Yes! I am Interested

USB 3.0 Y Cable Extender

USB 3.0 Y Cable Extender
  • USB 3.0 Y Cable Extender
Ask For Price
The USB 3.0 Y cable extender adds an additional 3 in. USB connector to power your DL3 or H series encrypted hard drives. Use the Y-cable extender with your existing cable for extra power.
Request
Callback
Yes! I am Interested

Gate Protect

Gate Protect
  • Gate Protect
Ask For Price
The Next Generation Firewall Appliances by gateProtect combine state-of-the-art security and network features such as firewalls, bridging, VLAN, single sign-on, traffic shaping, QoS, IPsec/SSL (X.509), IDS/IPS, web filters, virus filters, real-time spam detection, HTTPs proxy, and VPN Crypto acceleration in a single unified system.
The “Next Generation Firewall Appliances” from GateProtect are characterized by optimal scalability, security and performance. Thanks to a unique and patented eGUI® technology, gateProtect sets standards when it comes to the configuration of modern security systems.
For more than 10 years, gateprotect has been effectively protecting companies worldwide against cyber-attacks with IT security solutions “made in Germany”.
The extensive Unified Threat Management solutions for medium-sized companies, the Next Generation Firewalls for highest security requirements in large companies and the Managed Security systems from gateprotect provide for reliable network security. With gateprotect “Complete Security”, even mobile devices can be protected reliably.
Request
Callback
Yes! I am Interested

Changor Cloud

Changor Cloud
  • Changor Cloud
Ask For Price

GhangorCloud offers the most powerful “Best of the Breed” industry recognized Information Security & Compliance solution that enables and enforces Information Security & Data Leak Prevention capabilities far and beyond any traditional DLP solution.

The GhangorCloud Compliance Enforcer family of turnkey appliances leverage GhangorCloud’s powerful algorithms for advanced accuracy, automated security policy management and compliance reporting in a single, centralized administrator’s console. As a result, enterprises, businesses and Government Departments can reduce data security and compliance administration and enforcement from weeks to just minutes while minimizing data breaches and internal malicious threats.

Headquartered in Silicon Valley, GhangorCloud is a leading provider of next-generation Information Security & Compliance solutions. GhangorCloud's Information Security & Compliance appliances protect data based on its contextual and conceptual meaning, using a powerful correlation engine and security algorithms to identify, classify and protect large volumes of information in real-time, with unprecedented accuracy. The company was founded by Silicon Valley security veteran Tarique Mustafa and is backed by a team, board and advisors that include leading authorities from companies like Symantec, McAfee, VeriSign, Cisco, Juniper, Alteon & Array Networks. 

Request
Callback
Yes! I am Interested

Kaspersky

Kaspersky
  • Kaspersky
Ask For Price

Kaspersky Lab is one of the fastest growing IT security vendors in the world. Firmly positioned as one of the top four leading antivirus vendors*, Kaspersky Lab continues to improve its market position. According to the company's 2012 unaudited financial results, Kaspersky Lab's global revenue grew by 3% compared to the previous year and reached $628 million. Today it's the world's largest privately held vendor of endpoint protection solutions.

Kaspersky tools and technologies are uniquely balanced IT Scrutiny Solutions across progressive tiers to meet your evolving security and IT needs. Kaspersky makes the job easier by making the administrator see, control and protect their IT environment with Kaspersky Endpoint Security for Business.

One of the primary advantages of Kaspersky Lab's corporate range is the easy, centralized management provided by Kaspersky Security Center that extends to the entire network regardless of the number and type of platforms used.

Kaspersky Endpoint Security for Business is a platform which delivers a broad array of tools and technologies to enable companies to see, control and protect all endpoint devices. It combines its technologies and tools into four tiers, each of which adds its own layer of protection against cyber-threats.

The first level - Core - contains award-winning anti-malware technologies. Next come the Select and Advanced tiers, offering modern endpoint control and encryption. Finally, Total level security provides the best protection for each area of the network - web, mail and collaboration servers alike. At every level the Kaspersky Security Network provides powerful cloud-assisted protection to every component, and Kaspersky Security Center tools help IT specialists to manage the whole company's IT defenses from a single console.

Kaspersky Endpoint Security for Business also features targeted solutions which can be added to any tier:
Kaspersky Security for File Servers
Kaspersky Security for Mobile
Kaspersky Systems Management
Kaspersky Security for Virtualization
Kaspersky Security for Storage
Kaspersky Security for Collaboration
Kaspersky Security for Mail
Kaspersky Security for Internet Gateways

 

Request
Callback
Yes! I am Interested
View PDF

NNT

NNT
  • NNT
Ask For Price
Information security is now a mainstream requirement for all organizations, of all sizes and industriesThe range and variety of threats to your confidential data is not only vast, but growing and evolving all the time. Firewalls and anti-virus protection have been sidelined, only providing protection against a fraction of today's threats to your information assets – zero day threats, mutating malware, APT's or advanced persistent threats, coupled with phishing and insider threats mean that your network and servers are exposed right now.
Request
Callback
Yes! I am Interested

Air Tight

Air Tight
  • Air Tight
Ask For Price

AirTight Networks offers enterprises the next generation of intelligent edge, secure, and flexible WLAN solutions.

Intelligent Edge Wi-Fi

AirTight's purpose-built, plug-and-play Wi-Fi AP/Sensor devices and its controller-less architecture enable a fully functional and fault-tolerant WLAN operation at the edge, and eliminate the cost, complexity and inefficiencies of legacy thin APs managed with controllers.

Top-ranked Security

AirTight offers industry's top-ranked and truly automated wireless intrusion prevention system (WIPS), powered with 25+ US and international patents, and certified for FIPS140-2, Common Criteria EAL2+, and DISA UC APL. AirTight WIPS detects all types of wireless threats, eliminates false alarms, and allows its customers to reliably turn on wireless intrusion prevention that can precisely block any Wi-Fi misuse without interfering with legitimate communication. With its WIPS technology built-in, AirTight offers industry's only WLAN solution that is armed to defend enterprise networks from wireless threats 24/7.

Request
Callback
Yes! I am Interested

Bluecat

Bluecat
  • Bluecat
Ask For Price
BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. We enable you to stay "always on" and connected. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. That's why many of the largest and most secure organizations in the world trust BlueCat. Enterprises and government agencies worldwide trust BlueCat to manage millions of devices and solve real business and IT challenges - from secure, risk-free BYOD to virtualization and cloud automation. Our Innovation and strong technology has been noted and verified by various independent worldwide including Gartner which rates us as "Strong Positive".
  • Network Intelligence
    Centrally manage everything on the network and gain visibility, insight and actionable Intelligence on IP address space, networks, hostnames, devices and core network services - all from a multi-tenant Web-based interface.
  • Network Management Pains
    Better management and visibility and visibility of the network ensures that your network does not face high profile outages due to IP conflicts or network blind spots. For IPV6 Migration it gives you a better understanding of the network.
  • Self-Service BYOD Registration
    Manage the explosive growth of network-dependent devices including corporate-owned and personal consumer devices and reduce the risks of BYOD by automating device on-boarding and securing both the network and devices.
  • Automation and Self-Service
    Allow IT to be more responsive to the needs of the business by integrating IPAM into existing IT processes and workflow and enabling efficient self-service. The combination of automation and Self-service lessens the IT burden of managing routine IPAM changes and dramatically reduces the turnaround time for critical network requests from days to minutes.
  • Network Discovery
    Automatic network discovery retrieves key information directly from routers and switches, enabling the IPAM solution to automatically augment its own data, which already includes the device's unique MAC address, IPv4/IPv6 addresses and DNS records, with valuable network-sourced data. Information such as switch port data can be appended to the IP address stored within the IPAM repository to provide a richer source of network intelligence. With network discovery, you can quickly and easily identify changes to connected devices across geographically dispersed networks
  • Network Reconciliation
    Network reconciliation makes the data captured through network discovery actionable, allowing you to better monitor and control devices, IP addresses, names and locations. Changes to discovered IPv4/IPv6 data can be compared in order to identify unused IP addresses for reclamation and/or unauthorized IP addresses that can create security vulnerabilities, such as non-compliant ad-hoc wireless access points set up by employees.
Request
Callback
Yes! I am Interested

Deep Identity

Deep Identity
  • Deep Identity
Ask For Price
Deep Identity is an innovation leader in providing comprehensive and unique solution to address today’s requirements of an enterprise for :
• Identity governance and administration (IGA) • Compliance management • Data governance

Deep Identity offers a layered approach that enables better visibility and controls, ultimately automating compliance management in a cost effective manner. It provides business with the relevant reporting and analytics to improve IT security, maintain compliance and eventually minimize business risk.

With ‘Layered Approach’, Deep Identity solutions penetrate deeper to bridge Identities, Accounts along with Entitlements information to provide transparencies for downstream processes such as Attestation, Compliance, Role Management, Audit and Reporting.

Request
Callback
Yes! I am Interested

GFI Software

GFI Software
  • GFI Software
Ask For Price
GFI Software pioneers powerful, award-winning IT solutions for small and medium-sized businesses - and we make them affordable and easy to use. Our aim is for you to access all the IT Solutions you need from a single source: We provide web and mail security, archiving, backup and fax, networking and security software, and hosted IT SOLUTIONS. GFI believes in keeping technology simple where possible, and provide expert help and resources when you need them.
Request
Callback
Yes! I am Interested

Ironkey

Ironkey
  • Ironkey
Ask For Price

IronKey is the brand name for the family of secure portable data storage and mobile workspace solutions offered by Imation Corp.,a global scalable storage and data security company.

  • Focused on data storage and security

  • Safeguard your data with highest security levels available

  • Carry files with complete confidence

  • Great user experience

  • Meet and exceed compliance regulations

  • Easy to deploy and use.

  • Organized in two strategic business units:

  1. Consumer Storage and Accessories (CSA)

  2. Tiered Storage and Security Solutions (TSS) 

 

IRONKEY FEATURES OVERVIEW

  1. AES256Bit Hardware Encryption

  2. FIPS-140-2 Level 3 Certification

  3. Ruggedised and Water Resistant

  4. Remote Management

  5. Virus and Malware Protection

 

IRONKEY WORKSPACE PRODUCT SELECTION

  1. Turn most any PC into an IT provisioned, IT managed, IT secure workstation.

  2. Cost approximately 1/10 to 1/5 that of an IT managed, provisioned and secured laptop.

  3. Microsoft Certified / USB 3.0/ Ruggedised / Window to Hardware Encryption.

 

IRONKEY MANAGEMENT

  1. Centrally administer device access & usage policies

  2. Enforce device-specific polices

  3. Easily manage thousands of storage or workspace devices via an intuitive, secure online interface

  4. Securely recover access to user devices

  5. Prepare for business continuity by mass provisioning

Request
Callback
Yes! I am Interested

Landesk Software

Landesk Software
  • Landesk Software
Ask For Price

Niksun

Niksun
  • Niksun
Ask For Price
NIKSUN® is the recognized worldwide leader in making the Unknown Known. The company develops a highly scalable array of real time and forensics-based cybersecurity and network performance management solutions for government & intelligence agencies, service providers, financial services companies, and large enterprises such as retailers and manufacturers. NIKSUN´s award-winning appliances deliver unprecedented flexibility and packet capture power. The company´s patented real-time analysis and recording technology is the industry´s most comprehensive solution for secure and reliable network infrastructure and services, providing the power to instantly Know the Unknown.® NIKSUN, headquartered in Princeton, New Jersey, has sales offices and distributors throughout the US, Europe, Mid East and Asia-Pacific.
Request
Callback
Yes! I am Interested

Win Magic

Win Magic
  • Win Magic
Ask For Price
WinMagic Inc. develops full-disk encryption software. Its SecureDoc line of products ensures protection of sensitive information stored on desktops and laptops by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. WinMagic's award winning products fulfill the requirements of even the most security conscious users by focusing on concrete security features, nevertheless still offering unparalleled flexibility. Thousands of the most security conscious enterprises and government organizations around the world depend on SecureDoc to minimize business risks, meet privacy and regulatory compliance requirements, and protect valuable information assets against unauthorized access. With a full complement of professional and customer services, WinMagic supports over five million SecureDoc users in more than 80 countries.
WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions. WinMagic develops full-disk encryption software that is used to encrypt sensitive data on hard or solid state drives and to manage encrypted or BIOS password protected devices, including computers with self-encrypting drives. WinMagic's SecureDoc full-disk encryption suite provides protection of data-at-rest stored on desktops, laptops, and other mobile devices by encrypting all data on the disk and employing single- or multi-factor pre-boot authentication (password, hardware token, TPM, biometrics, PKI).
Request
Callback
Yes! I am Interested

WinMagic Data Security

WinMagic Data Security
  • WinMagic Data Security
Ask For Price
WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions. WinMagic develops full-disk encryption software that is used to encrypt sensitive data on hard or solid state drives and to manage encrypted or BIOS password protected devices, including computers with self-encrypting drives. WinMagic's SecureDoc full-disk encryption suite provides protection of data-at-rest stored on desktops, laptops, and other mobile devices by encrypting all data on the disk and employing single- or multi-factor pre-boot authentication (password, hardware token, TPM, biometrics, PKI).
Request
Callback
Yes! I am Interested

Data Encryption Services

Ask For Price
Yes! I am Interested

Vulnerability Management Services

Ask For Price
Yes! I am Interested

Internet Security Services

Ask For Price
Yes! I am Interested

Antivirus Software Development Services

Ask For Price
Yes! I am Interested
X
Looking for “IT Security”?


Reach Us
Nisha Kushwaha (Manager)
MBC Centre, Ground Floor, 143/A, Ghodbunder Road Kapurbawdi, Thane West
Mumbai- 400607, Maharashtra, India


Call Us

Send E-mail

Send SMS