Products
About 15492 products found for- Cyber-Immune Design: Built on KasperskyOS for security by design.
- VDI Support: Supports virtual desktop infrastructures.
- Remote Access: Enables secure access to remote applications.
- Centralized Management: Allows unified control of thin client devices.
- Secure Microkernel: Uses a minimal and highly secure kernel design.
- Component Isolation: Isolates system components to limit attack impact.
- Policy-Based Control: Strictly controls interactions between processes.
- Reduced Attack Surface: Limits exploitable system functions.
- Integration Ready: Designed for embedding into third-party solutions.
- High Performance: Optimized for fast scanning and low latency.
- File Scanning: Scans files and objects for malicious content.
- Data Stream Analysis: Analyzes data streams in real time.
- Machine Learning Analysis: Uses ML models to analyze large data sets.
- Unknown Threat Detection: Detects threats without known signatures.
- Behavioral Monitoring: Monitors activity across systems and processes.
- Early Warning: Value: Provides early alerts for suspicious activity.
- Phishing Simulations: Tests employee response to phishing attacks.
- Automated Campaigns: Runs training and simulations automatically.
- Learning Paths: Provides structured cybersecurity training programs.
- User Assessment: Measures employee security behavior over time
- Global Threat Coverage: Covers threats observed worldwide.
- Indicators of Compromise: Supplies IOCs for faster threat detection.
- Malware Analysis: Delivers insights into malware behavior and risks.
- Threat Context: Adds context to security alerts and incidents.
- Behavioral Analysis: Detects abnormal user behavior patterns.
- Account Protection: Prevents account takeover attempts.
- Transaction Monitoring: Analyzes online payment activities.
- Device Profiling: Identifies suspicious or risky devices.
- Real-Time Monitoring: Continuously monitors airspace activity.
- Drone Tracking: Tracks drone movement and flight paths.
- Threat Identification: Identifies drone types and behavior.
- Area Protection: Secures restricted and sensitive locations.
- Asset Visibility: Identifies and monitors OT and ICS assets.
- Industrial Protocol Support: Supports common industrial communication protocols.
- Non-Intrusive Monitoring: Operates without disrupting industrial processes.
- Centralized Management: Provides a unified view of OT security status.
- Data Sovereignty: Ensures no security data is shared externally.
- Threat Intelligence: Uses Kaspersky detection technologies locally.
- Reputation Services: Provides local file and URL reputation checks.
- Compliance Support: Meets strict regulatory and security requirements.
- Real-Time Correlation: Correlates events to identify security incidents.
- Threat Detection: Detects suspicious activity and potential threats.
- Alerting: Generates alerts for critical security events.
- Log Management: Stores and manages large volumes of log data.
- Runtime Protection: Monitors containers for suspicious behavior during execution.
- Kubernetes Support: Integrates with Kubernetes environments.
- Vulnerability Detection: Identifies known weaknesses in container images.
- Policy Enforcement: Applies security rules across container workloads.
- Virtual Machine Security: Protects VMs from malware and advanced threats.
- Centralized Management: Manages security policies from a single console.
- Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
- System Integrity Monitoring: Monitors critical system changes in cloud environments.
- Secure Connectivity: Protects data traffic between network locations.
- Traffic Optimization: Routes traffic based on performance and policies.
- Centralized Management: Manages all sites from a single console.
- Link Aggregation: Uses multiple network links for better reliability.
- Zero-Day Protection: Detects previously unknown exploits.
- Behavioral Analysis: Analyzes suspicious behavior to identify attacks.
- Sandbox Analysis: Safely analyzes suspicious files in isolation.
- Network Traffic Analysis: Detects malicious activity in network communications.
- URL Filtering: Controls access to websites by category.
- Real-Time Traffic Scanning: Scans web traffic as it passes through the gateway.
- Phishing Protection: Prevents access to phishing and fake websites.
- Malware Detection: Identifies and blocks web-delivered malware.
- Phishing Defense: Prevents phishing and social engineering attacks.
- Spam Filtering: Reduces unwanted and harmful email traffic.
- Real-Time Scanning: Scans emails as they pass through the server.
- Attachment Control: Inspects and blocks dangerous file types.
- Malware Detection: Scans attachments and links for malware.
- Exchange Online Security: Protects Microsoft Exchange Online mailboxes.
- OneDrive Protection: Scans files stored in OneDrive for threats.
- SharePoint Protection: Secures shared documents and collaboration spaces.
- Extended Threat Detection: Identifies advanced and multi-stage cyber attacks.
- Incident Response Support: Provides expert guidance during security incidents.
- Centralized Visibility: Offers a unified view of detected threats.
- Alert Prioritization: Filters and prioritizes critical security alerts.
- Extended Threat Visibility: Provides deep insight into complex attack chains.
- Threat Hunting: Enables proactive search for hidden threats.
- Incident Investigation: Supports detailed attack analysis and timelines.
- Centralized Workspace: Unifies alerts and investigations in one console.
- Extended Detection: Detects attacks spanning multiple security layers.
- Centralized Visibility: Provides a unified view of security incidents.
- Incident Investigation: Helps analyze attacks across connected systems.
- Guided Response: Assists teams in responding to incidents effectively.
- Deep Endpoint Visibility: Provides detailed telemetry from protected endpoints.
- Incident Investigation: Supports full attack timeline and root cause analysis.
- Manual Response Actions: Allows precise containment and remediation actions.
- Automated Response: Supports automated actions for faster threat control.
- Automated Response: Automatically isolates and contains infected endpoints.
- Endpoint Monitoring: Continuously tracks endpoint activities in real time.
- Behavioral Analysis: Identifies threats using behavior-based detection.
- Incident Investigation: Provides detailed attack context and timelines.
- Threat Detection: Identifies suspicious and malicious endpoint behavior.
- Incident Investigation: Provides visibility into attack timelines and activities.
- Guided Response: Helps security teams contain threats quickly.
- Behavioral Analysis: Detects threats beyond signature-based methods.
- Application Control: Allows only trusted applications to run on the system.
- Device Control: Restricts USB ports and external peripherals.
- System Hardening: Reduces attack surface by locking down system components.
- Centralized Management: Managed through Kaspersky Security Center.
- Product LineUbiquiti RocketDish: Ubiquiti RocketDish
- Model: RD-5G30-LW
- Antenna Form Type: Dish
- Category of Accessory: Antennas
- Wireless Frequency: 5 GHz
- Inputs/Outputs: 1x RJ45 Gigabit Ethernet
- RAM: 128 MB
- Power Consumption: 9.5 W
- Wi-Fi: Wi-Fi 6 (802.11ax); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (4 x 4)
- Antenna Gain: 5 to 5.9 dBi
- Transmit Power: 22 to 26 dBm
- Power Consumption: 11 W
- Dimensions: ?19.81 x 18.29 x 5.33 cm; 335.66 g
- Operating System: airOS
- Special Features: WPS
- Compatible Devices: Laptop
- Wi-Fi: Wi-Fi 7 (802.11be); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
- Antenna Gain: 8 dBi
- Transmit Power: 24 dBm
- Input Power: 42.5 to 57 VDC
- Wi-Fi: Wi-Fi 7 (802.11be); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
- Antenna Gain: 5 dBi
- Transmit Power: 24 dBm
- Inputs/Outputs: 1x RJ45 2.5 GbE PoE (Unspecified)
- Wi-Fi: Wi-Fi 7 (802.11be); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
- Antenna Gain: 4 to 6 dBi
- Transmit Power: 26 to 27 dBm
- Inputs/Outputs: 1x RJ45 2.5 GbE PoE+ (30 W, 802.3at)
- Wi-Fi: Wi-Fi 7 (802.11be); Tri-Band (2.4, 5, & 6 GHz) with MU-MIMO Support (2 x 2)
- Antenna Gain: 4 to 5.8 dBi
- Transmit Power: 22 to 26 dBm
- Inputs/Outputs: 1x RJ45 2.5 GbE PoE+ (30 W, 802.3at)
- Wi-Fi: Wi-Fi 7 (802.11be); Tri-Band (2.4, 5, & 6 GHz) with MU-MIMO Support (2 x 2)
- Antenna Gain: 6 dBi
- Transmit Power: 26 dBm
- Inputs/Outputs: 1x RJ45 10 GbE PoE+ (30 W, 802.3at)
- Wi-Fi: Wi-Fi 5 (802.11ac); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
- Number of Antennas: 2
- Antenna Gain: 3 to 4 dBi
- Transmit Power: 20 dBm
- Series: ?UAP-FlexHD-US
- Dimensions: ?12.7 x 7.62 x 7.62 cm; 907.18 g
- Connectivity Type: ?Wi-Fi
- Operating System: RouterOS
- Model: ?UCG-Max
- Dimensions: ?22 x 18.21 x 8.2 cm; 990 g
- Memory Storage Capacity: ?2 TB
- Hard Drive Size: ?1 TB
- Model: ?UDM-Pro-Max
- Dimensions: ?28.45 x 44.2 x 4.32 cm; 4.7 kg
- Ram Memory Installed Size: ?8000 MB
- Compatible Devices: ?Security Camera, Smartphone
- Model Name: UDR7
- Special Feature: Advanced Network Management, High-Speed Connectivity Options
- Frequency Band Class: Quad-Band
- Wireless Communication Standard: 802.11ad, 802.11ax
- Playback Resolution: 1080p, 4K
- Recording Resolution: 4K, 1080p
- IP Camera Support: 50
- Communication I/O: 1x RJ45 Gigabit Ethernet 1x SFP+
- Playback Resolution: 1080p, 4K
- Recording Resolution: 4K, 1080p
- Bluetooth: Bluetooth 4.1
- PoE Power Budget: 135 W
- Dimensions: 86 x 46 x 33 mm (3.39 x 1.81 x 1.30")
- Weight: 100 g (3.53 oz)
- Output Voltage: 48VDC @ 0.32A
- Rated Voltage: 100-240VAC @ 50/60Hz
- Dimensions: 424.4 x 200 x 43.7 mm
- Weight: 3.00 kg (6.61 lb)
- Interfaces: 10/100/1000 RJ45 Ports
- Management: Ethernet In-Band
- Model: USW-Enterprise-24-PoE
- Number of Ports: 24
- Included Components: Blu-ray
- Compatible Devices: Smartphone
- Dimensions: 442 x 400 x 44 mm (17.4 x 15.7 x 1.7")
- Weight: Without mounting brackets: 6.2 kg (13.8 lb)
- Networking interface: (48) GbE RJ45 ports (4) 1/10G SFP+ ports
- Networking interface: (40) PoE/PoE+ (Pins 1, 2+; 3, 6-) (8) 60W PoE++; PoE/PoE+ (Pins 1, 2+; 3, 6-) / PoE++ (Pair A 1, 2+; 3, 6-) (Pair B 4, 5+; 7, 8-)
- Dimensions: 20.1L x 44.2W x 4.3H Centimeters
- Weight: 6.61 Pounds
- Case Material Type: Metal
- Interface Type: PoE+, SFP, RJ45
- Networking: 48 x 10/100/1000 RJ45 Ports
- Management: Ethernet In-Band
- Total Non-Blocking Throughput: 88 Gbps
- Switching Capacity: 176 Gbps
- Forwarding rate: 565.44 Mpps
- Throughput: 380 Mpps
- Switching capacity: 760 Gbit/s
- Switch type: Managed
