Here is our collection of All Products

Discover our premium range of IT products and solutions for businesses. ICTECH Distribution offers high-quality hardware, software, and networking equipment to power your enterprise.

Products

About 15492 products found for
Order by
  • Cyber-Immune Design: Built on KasperskyOS for security by design.
  • VDI Support: Supports virtual desktop infrastructures.
  • Remote Access: Enables secure access to remote applications.
  • Centralized Management: Allows unified control of thin client devices.
  • Secure Microkernel: Uses a minimal and highly secure kernel design.
  • Component Isolation: Isolates system components to limit attack impact.
  • Policy-Based Control: Strictly controls interactions between processes.
  • Reduced Attack Surface: Limits exploitable system functions.
  • Integration Ready: Designed for embedding into third-party solutions.
  • High Performance: Optimized for fast scanning and low latency.
  • File Scanning: Scans files and objects for malicious content.
  • Data Stream Analysis: Analyzes data streams in real time.
  • Machine Learning Analysis: Uses ML models to analyze large data sets.
  • Unknown Threat Detection: Detects threats without known signatures.
  • Behavioral Monitoring: Monitors activity across systems and processes.
  • Early Warning: Value: Provides early alerts for suspicious activity.
  • Phishing Simulations: Tests employee response to phishing attacks.
  • Automated Campaigns: Runs training and simulations automatically.
  • Learning Paths: Provides structured cybersecurity training programs.
  • User Assessment: Measures employee security behavior over time
  • Global Threat Coverage: Covers threats observed worldwide.
  • Indicators of Compromise: Supplies IOCs for faster threat detection.
  • Malware Analysis: Delivers insights into malware behavior and risks.
  • Threat Context: Adds context to security alerts and incidents.
  • Behavioral Analysis: Detects abnormal user behavior patterns.
  • Account Protection: Prevents account takeover attempts.
  • Transaction Monitoring: Analyzes online payment activities.
  • Device Profiling: Identifies suspicious or risky devices.
  • Real-Time Monitoring: Continuously monitors airspace activity.
  • Drone Tracking: Tracks drone movement and flight paths.
  • Threat Identification: Identifies drone types and behavior.
  • Area Protection: Secures restricted and sensitive locations.
  • Asset Visibility: Identifies and monitors OT and ICS assets.
  • Industrial Protocol Support: Supports common industrial communication protocols.
  • Non-Intrusive Monitoring: Operates without disrupting industrial processes.
  • Centralized Management: Provides a unified view of OT security status.
  • Data Sovereignty: Ensures no security data is shared externally.
  • Threat Intelligence: Uses Kaspersky detection technologies locally.
  • Reputation Services: Provides local file and URL reputation checks.
  • Compliance Support: Meets strict regulatory and security requirements.
  • Real-Time Correlation: Correlates events to identify security incidents.
  • Threat Detection: Detects suspicious activity and potential threats.
  • Alerting: Generates alerts for critical security events.
  • Log Management: Stores and manages large volumes of log data.
  • Runtime Protection: Monitors containers for suspicious behavior during execution.
  • Kubernetes Support: Integrates with Kubernetes environments.
  • Vulnerability Detection: Identifies known weaknesses in container images.
  • Policy Enforcement: Applies security rules across container workloads.
  • Virtual Machine Security: Protects VMs from malware and advanced threats.
  • Centralized Management: Manages security policies from a single console.
  • Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
  • System Integrity Monitoring: Monitors critical system changes in cloud environments.
  • Secure Connectivity: Protects data traffic between network locations.
  • Traffic Optimization: Routes traffic based on performance and policies.
  • Centralized Management: Manages all sites from a single console.
  • Link Aggregation: Uses multiple network links for better reliability.
  • Zero-Day Protection: Detects previously unknown exploits.
  • Behavioral Analysis: Analyzes suspicious behavior to identify attacks.
  • Sandbox Analysis: Safely analyzes suspicious files in isolation.
  • Network Traffic Analysis: Detects malicious activity in network communications.
  • URL Filtering: Controls access to websites by category.
  • Real-Time Traffic Scanning: Scans web traffic as it passes through the gateway.
  • Phishing Protection: Prevents access to phishing and fake websites.
  • Malware Detection: Identifies and blocks web-delivered malware.
  • Phishing Defense: Prevents phishing and social engineering attacks.
  • Spam Filtering: Reduces unwanted and harmful email traffic.
  • Real-Time Scanning: Scans emails as they pass through the server.
  • Attachment Control: Inspects and blocks dangerous file types.
  • Malware Detection: Scans attachments and links for malware.
  • Exchange Online Security: Protects Microsoft Exchange Online mailboxes.
  • OneDrive Protection: Scans files stored in OneDrive for threats.
  • SharePoint Protection: Secures shared documents and collaboration spaces.
  • Extended Threat Detection: Identifies advanced and multi-stage cyber attacks.
  • Incident Response Support: Provides expert guidance during security incidents.
  • Centralized Visibility: Offers a unified view of detected threats.
  • Alert Prioritization: Filters and prioritizes critical security alerts.
  • Extended Threat Visibility: Provides deep insight into complex attack chains.
  • Threat Hunting: Enables proactive search for hidden threats.
  • Incident Investigation: Supports detailed attack analysis and timelines.
  • Centralized Workspace: Unifies alerts and investigations in one console.
  • Extended Detection: Detects attacks spanning multiple security layers.
  • Centralized Visibility: Provides a unified view of security incidents.
  • Incident Investigation: Helps analyze attacks across connected systems.
  • Guided Response: Assists teams in responding to incidents effectively.
  • Deep Endpoint Visibility: Provides detailed telemetry from protected endpoints.
  • Incident Investigation: Supports full attack timeline and root cause analysis.
  • Manual Response Actions: Allows precise containment and remediation actions.
  • Automated Response: Supports automated actions for faster threat control.
  • Automated Response: Automatically isolates and contains infected endpoints.
  • Endpoint Monitoring: Continuously tracks endpoint activities in real time.
  • Behavioral Analysis: Identifies threats using behavior-based detection.
  • Incident Investigation: Provides detailed attack context and timelines.
  • Threat Detection: Identifies suspicious and malicious endpoint behavior.
  • Incident Investigation: Provides visibility into attack timelines and activities.
  • Guided Response: Helps security teams contain threats quickly.
  • Behavioral Analysis: Detects threats beyond signature-based methods.
  • Application Control: Allows only trusted applications to run on the system.
  • Device Control: Restricts USB ports and external peripherals.
  • System Hardening: Reduces attack surface by locking down system components.
  • Centralized Management: Managed through Kaspersky Security Center.
  • Product LineUbiquiti RocketDish: Ubiquiti RocketDish
  • Model: RD-5G30-LW
  • Antenna Form Type: Dish
  • Category of Accessory: Antennas
  • Wireless Frequency: 5 GHz
  • Inputs/Outputs: 1x RJ45 Gigabit Ethernet
  • RAM: 128 MB
  • Power Consumption: 9.5 W
  • Wi-Fi: Wi-Fi 6 (802.11ax); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (4 x 4)
  • Antenna Gain: 5 to 5.9 dBi
  • Transmit Power: 22 to 26 dBm
  • Power Consumption: 11 W
  • Dimensions: ?19.81 x 18.29 x 5.33 cm; 335.66 g
  • Operating System: airOS
  • Special Features: WPS
  • Compatible Devices: Laptop
  • Wi-Fi: Wi-Fi 7 (802.11be); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
  • Antenna Gain: 8 dBi
  • Transmit Power: 24 dBm
  • Input Power: 42.5 to 57 VDC
  • Wi-Fi: Wi-Fi 7 (802.11be); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
  • Antenna Gain: 5 dBi
  • Transmit Power: 24 dBm
  • Inputs/Outputs: 1x RJ45 2.5 GbE PoE (Unspecified)
  • Wi-Fi: Wi-Fi 7 (802.11be); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
  • Antenna Gain: 4 to 6 dBi
  • Transmit Power: 26 to 27 dBm
  • Inputs/Outputs: 1x RJ45 2.5 GbE PoE+ (30 W, 802.3at)
  • Wi-Fi: Wi-Fi 7 (802.11be); Tri-Band (2.4, 5, & 6 GHz) with MU-MIMO Support (2 x 2)
  • Antenna Gain: 4 to 5.8 dBi
  • Transmit Power: 22 to 26 dBm
  • Inputs/Outputs: 1x RJ45 2.5 GbE PoE+ (30 W, 802.3at)
  • Wi-Fi: Wi-Fi 7 (802.11be); Tri-Band (2.4, 5, & 6 GHz) with MU-MIMO Support (2 x 2)
  • Antenna Gain: 6 dBi
  • Transmit Power: 26 dBm
  • Inputs/Outputs: 1x RJ45 10 GbE PoE+ (30 W, 802.3at)
  • Wi-Fi: Wi-Fi 5 (802.11ac); Dual-Band (2.4 & 5 GHz) with MU-MIMO Support (2 x 2)
  • Number of Antennas: 2
  • Antenna Gain: 3 to 4 dBi
  • Transmit Power: 20 dBm
  • Series: ?UAP-FlexHD-US
  • Dimensions: ?12.7 x 7.62 x 7.62 cm; 907.18 g
  • Connectivity Type: ?Wi-Fi
  • Operating System: RouterOS
  • Model: ?UCG-Max
  • Dimensions: ?22 x 18.21 x 8.2 cm; 990 g
  • Memory Storage Capacity: ?2 TB
  • Hard Drive Size: ?1 TB
  • Model: ?UDM-Pro-Max
  • Dimensions: ?28.45 x 44.2 x 4.32 cm; 4.7 kg
  • Ram Memory Installed Size: ?8000 MB
  • Compatible Devices: ?Security Camera, Smartphone
  • Model Name: UDR7
  • Special Feature: Advanced Network Management, High-Speed Connectivity Options
  • Frequency Band Class: Quad-Band
  • Wireless Communication Standard: 802.11ad, 802.11ax
  • Playback Resolution: 1080p, 4K
  • Recording Resolution: 4K, 1080p
  • IP Camera Support: 50
  • Communication I/O: 1x RJ45 Gigabit Ethernet 1x SFP+
  • Playback Resolution: 1080p, 4K
  • Recording Resolution: 4K, 1080p
  • Bluetooth: Bluetooth 4.1
  • PoE Power Budget: 135 W
  • Dimensions: 86 x 46 x 33 mm (3.39 x 1.81 x 1.30")
  • Weight: 100 g (3.53 oz)
  • Output Voltage: 48VDC @ 0.32A
  • Rated Voltage: 100-240VAC @ 50/60Hz
  • Dimensions: 424.4 x 200 x 43.7 mm
  • Weight: 3.00 kg (6.61 lb)
  • Interfaces: 10/100/1000 RJ45 Ports
  • Management: Ethernet In-Band
  • Model: USW-Enterprise-24-PoE
  • Number of Ports: 24
  • Included Components: Blu-ray
  • Compatible Devices: Smartphone
  • Dimensions: 442 x 400 x 44 mm (17.4 x 15.7 x 1.7")
  • Weight: Without mounting brackets: 6.2 kg (13.8 lb)
  • Networking interface: (48) GbE RJ45 ports (4) 1/10G SFP+ ports
  • Networking interface: (40) PoE/PoE+ (Pins 1, 2+; 3, 6-) (8) 60W PoE++; PoE/PoE+ (Pins 1, 2+; 3, 6-) / PoE++ (Pair A 1, 2+; 3, 6-) (Pair B 4, 5+; 7, 8-)
  • Dimensions: 20.1L x 44.2W x 4.3H Centimeters
  • Weight: 6.61 Pounds
  • Case Material Type: Metal
  • Interface Type: PoE+, SFP, RJ45
  • Networking: 48 x 10/100/1000 RJ45 Ports
  • Management: Ethernet In-Band
  • Total Non-Blocking Throughput: 88 Gbps
  • Switching Capacity: 176 Gbps
  • Forwarding rate: 565.44 Mpps
  • Throughput: 380 Mpps
  • Switching capacity: 760 Gbit/s
  • Switch type: Managed
Showing 1153-1200 of 15492 results.
whatsapp