info@teonabilisim.com.tr
TR
|
EN
HOME
SERVICES
Security Counselling
Product and Technology Training
Installation and Technical Support
Information Security Management
Penetration Tests
GPDR and Compliance Procedures
SOLUTION AND TECHNOLOGIES
Network Security
Endpoint Security
Applicaton and Database Security
Security Management
Backup Technologies
Monitor and Performance Management
Vulnerability Management
PRODUCTS
ENTERPRISE
ABOUT US
MISSION AND VISTA
PARTNERS
POLICIES
CONTACT
+90 (312) 985 05 55
OUR PRODUCTS
Home
Supported Vendors and Products
You can see our supported Vendor and Products details below.
Trellix
Security Management - e-Policy Orchestrator and Threat Intelligence
Security Operations - Security Information Event Management
Endpoint Security - Endpoint Security and Application Control
Endpoint Detection and Response - Active Response
Web Security - Web Gateway
Advanced Malware Detection - Advanced Threat Defense
Database Security - Database Activity Monitor
Data Protection and Encryption - Data Loss Prevention and Encryption
Intrusion Prevention System - Network Security Platform
Fortinet
Firewall - FortiGate
Web Application Firewall - FortiWeb
E-Mail Security - FortiMail
Analyzing - FortiAnalyzer
Management - FortiManager
Symantec/Bluecoat
Forensic and Security Analytics - Network Forensic and Security Analytics
SSL/TLS Decryption - SSL Visibility
Web Security - ProxySG
Anvanced Malware Analysis - Content and Malware Analysis
E-Mail Security - Messaging Security Gateway
Reporting - Reporter
Central Management - Management Center
Bandwidth Optimization and Performance Management - Packet Shaper
Endpoint Security - Symantec SEP
Endpoint Dedection and Response - Symantec EDR
Data Protection - Symantec DLP
Palo Alto Networks
Firewall - Next Generation Firewall
Advanced Malware Detection and Protection - WildFire
Central Management and Reporting - Panoroma
Solarwinds
Network Monitoring - Network Performans Monitor
Netflow Analyzing - Netflow Traffic Analyzer
Server and Application Monitoring - Server Application Monitor
Configuration Management - Network Configuration Manager
Access Rights and Event Management - Access Rights Manager
IXIA
Network Traffic Control - Packet Broker
Network Security Products Test - Breaking Point
Network Traffic Tapping - Network Taps
IBM Security
Security Information Event Management - Qradar
Database Security Firewall - GUARDIUM
Proofpoint
E-Mail Security - E-Mail Protection
Cisco
E-Mail Protection - E-Mail Security
Arbor
Advanced Attack and DDOS Protection - Arbor Ddos
Juniper Networks
Firewall - Juniper Firewall
Pulse Secure
SSL VPN and Meeting - Remote Access VPN
Skybox Security
Netwokr Security Device and Configuration Analyze - Skybox Security
F5 Networks
Load Balancer - LTM
Advanced Web Application Firewall - ASM
DNS Security - DNS Security
Access Policy Manager - APM
Titus
Data Classification and Security - TITUS Classification
Boldon James
Data Classification and Security - Boldon James Classification
Tenable
Vulnerability Management and Reporting - Nessus
Forescout
Network Access Control and Management - Network Access Control
Splunk
SIEM and BigData Solutions - Splunk
VmWare
Virtualization Technologies - VmWare
Veeam
Backup Technologies - Veeam
Trend Micro
Smart Protection - Endpoint, Web and E-Mail Security
IPS - TippingPoint