Here is our collection of All Products

Discover our premium range of IT products and solutions for businesses. ICTECH Distribution offers high-quality hardware, software, and networking equipment to power your enterprise.

Products

About 16390 products found for
Order by
  • Connectivity Technology: Bluetooth Smart & 2.4GHz Wireless Connection
  • Tecnical Specification Keyboard: Keyboard Layout: 100%
  • Battery: Keyboard: Battery Details: 2 x AAA, Battery: 36 month, Mouse: Battery Details: 1 x AA, Battery: 18 months
  • Colour: Black
  • Model Number: 920-013463
  • Type: Keyboard
  • Special keys: On/Off power buttons
  • Additional Features: Tilt legs
  • Nominal value: DPI range
  • DPI range: 400-4000, Steps of 100 DPI
  • Number of Buttons: 3 (Left/Right-click, Middle click)
  • Battery life: 18 months
  • Connectivity: Wired
  • Key Types: Deep profile
  • Keys Life: Up to 10 million keystrokes (excludes number lock key)
  • Spill Resistant: 60 ml liquid spillage
  • Product: Logitech M100
  • Movement detection technology: Optical
  • Device interface: USB Type-A
  • Movement resolution: 1000 DPI
  • Product type: Document scanner
  • Paper format (max.): A4
  • Automatic document feeder (ADF): 80 sheets
  • Scan resolution (up to): 600 x 600 dpi
  • Duty Cycle: 7000 scans per day
  • Optical Resolution: 600 dpi
  • Dimensions: 28 cm x 17.2 cm x 17.8 cm
  • Supported Document Type: Plain paper
  • Product type: Document scanner
  • Paper format (max.): A4
  • Automatic document feeder (ADF): 60 sheets
  • Scan resolution (up to): 600 x 600 dpi
  • Maximum ISO A-series paper size: A3
  • Optical scanning resolution: 600 x 600
  • Weight: 25 kg
  • Light source: RGB LED
  • Product type: Document scanner
  • Paper format (max.): A4
  • Automatic document feeder (ADF): 30 sheets
  • Supported documents: Embossed cards, Standard paper, Business cards
  • Scanner Type: Sheetfed Scanner
  • Optical Resolution (ADF): 600 DPI x 600 DPI (Horizontal x Vertical)
  • Optical Resolution: 600 DPI x 600 DPI (Horizontal x Vertical)
  • ADF Minimum Document Size: 50,8 mm x 50,8 mm (Horizontal x Vertical)
  • Product Description: Epson WorkForce DS-70000 - document scanner - USB 2.0
  • Device Type: Document scanner
  • Interface Type: USB 2.0
  • Max Supported Document Size: A3 (297 x 420 mm)
  • Accessories: Wired Keyboard and Mouse
  • Processor (CPU): AMD Ryzen Threadripper PRO 7945WX (12C / 24T, 4.7 / 5.3GHz, 12MB L2 / 64MB L3)
  • Memory (RAM): 32GB RDIMM DDR5-4800 ECC (2 x 16GB)
  • Storage: 1TB SSD M.2 2280 PCIe 4.0x4 Performance NVMe Opal
  • Part Number: 21QC009SGR
  • Product type: Laptop
  • Display diagonal: 35,6 cm
  • Panel type: IPS
  • Part Number: HSSD-E0A7T6A3L7N
  • Read speed: 2.1GB/s
  • Write speed: 1.8GB/s
  • interface: SAS interface
  • Read speed: 2.1GB/s
  • Write speed: 1.8GB/s
  • Interface: SAS
  • Formfactor: U.2
  • Capacity: 1.92TB
  • Form Factor: 2.5 inches
  • Interface: SAS 12Gb/s
  • Read/Write Performance: High IOPS and low latency.
  • Form Factor: U.2
  • Weight: < 200 g (excluding the disk tray)
  • NAND Flash: 3D TLC
  • Interface Protocol: SAS 3.0
  • Resolution: FHD (1920 × 1080)
  • Aspect Ratio: 16:9
  • Response Time: 5ms (GTG)
  • Screen Size: 24"
  • Aspect Ratio: 16:9
  • Resolution: 4K (3,840 x 2,160)
  • Response Time: 0.03 ms (GtG)
  • Refresh Rate (Max): 165 Hz
  • Color: White
  • Model Number: LS27DM501EMXUE
  • Type: Smart Monitor
  • Display Type: VA
  • Aspect Ratio: 32:9
  • Screen Finish Type: Matte
  • Contrast Ratio: 3000:1
  • Refresh Rate: 180 hertz
  • Resolution: FHD (1,920 × 1,080)
  • Aspect Ratio: 16:9
  • Response Time: 4ms (GTG)
  • Refresh Rate: Max 60Hz
  • Screen Size (Class): 49
  • Flat / Curved: Curved
  • Screen Curvature: 1800R
  • Aspect Ratio: 32:9
  • Model Number: LS34DG852SMXUE
  • Type: Gaming Monitor
  • Color: Silver
  • Display Type: OLED
  • Model Number: 24M2N3200FQ
  • Type: Gaming Monitor
  • Display Type: IPS
  • Aspect Ratio: 16:9
  • Model Number: 27M2N3200FQ
  • Type: Gaming Monitor
  • Display Type: IPS
  • Aspect Ratio: 16:9
  • Panel Size: 34" / 86.36 cm
  • Aspect Ratio: 21:9
  • Monitor Panel Type: VA, 1500R
  • Backlight Type: W-LED
  • Model Number: 34M2C3500L
  • Type: Gaming Monitor
  • Aspect Ratio: 21:9
  • Resolution: WQHD (3440 x 1440)
  • Model Number: 27M2N3201A
  • Type: Gaming Monitor
  • Display Type: IPS
  • Aspect Ratio: 16:9
  • Brightness: 300 nits
  • Adjustability: Height, Swivel, Tilt
  • Refresh Rate: 180Hz
  • Contrast Ratio: 3000:1
  • Display - Resolution: 1920 x 1080
  • Display - Panel Type: IPS
  • Display - Aspect Ratio: 16:9
  • Display - Color Gamut (Typ.): NTSC 72% (CIE1931)
  • Inputs/Outputs: 2x RJ45 1x C6
  • Input Power: 90 to 260 VAC, 50 / 60 Hz
  • Operating Conditions: 32 to 104°F / 0 to 40°C at 35 to 95% Humidity
  • Dimensions: 3.6 x 2.4 x 1.3" / 9.2 x 6.0 x 3.3 cm
  • Product Name: PoE-48-24W 48V PoE Adapter
  • Product Model: POE-48-24W
  • Product Type: PoE Injector
  • Input Voltage: 120 V AC 230 V AC
  • Cyber-Immune Design: Built on KasperskyOS for security by design.
  • VDI Support: Supports virtual desktop infrastructures.
  • Remote Access: Enables secure access to remote applications.
  • Centralized Management: Allows unified control of thin client devices.
  • Secure Microkernel: Uses a minimal and highly secure kernel design.
  • Component Isolation: Isolates system components to limit attack impact.
  • Policy-Based Control: Strictly controls interactions between processes.
  • Reduced Attack Surface: Limits exploitable system functions.
  • Integration Ready: Designed for embedding into third-party solutions.
  • High Performance: Optimized for fast scanning and low latency.
  • File Scanning: Scans files and objects for malicious content.
  • Data Stream Analysis: Analyzes data streams in real time.
  • Machine Learning Analysis: Uses ML models to analyze large data sets.
  • Unknown Threat Detection: Detects threats without known signatures.
  • Behavioral Monitoring: Monitors activity across systems and processes.
  • Early Warning: Value: Provides early alerts for suspicious activity.
  • Phishing Simulations: Tests employee response to phishing attacks.
  • Automated Campaigns: Runs training and simulations automatically.
  • Learning Paths: Provides structured cybersecurity training programs.
  • User Assessment: Measures employee security behavior over time
  • Global Threat Coverage: Covers threats observed worldwide.
  • Indicators of Compromise: Supplies IOCs for faster threat detection.
  • Malware Analysis: Delivers insights into malware behavior and risks.
  • Threat Context: Adds context to security alerts and incidents.
  • Behavioral Analysis: Detects abnormal user behavior patterns.
  • Account Protection: Prevents account takeover attempts.
  • Transaction Monitoring: Analyzes online payment activities.
  • Device Profiling: Identifies suspicious or risky devices.
  • Real-Time Monitoring: Continuously monitors airspace activity.
  • Drone Tracking: Tracks drone movement and flight paths.
  • Threat Identification: Identifies drone types and behavior.
  • Area Protection: Secures restricted and sensitive locations.
  • Asset Visibility: Identifies and monitors OT and ICS assets.
  • Industrial Protocol Support: Supports common industrial communication protocols.
  • Non-Intrusive Monitoring: Operates without disrupting industrial processes.
  • Centralized Management: Provides a unified view of OT security status.
  • Data Sovereignty: Ensures no security data is shared externally.
  • Threat Intelligence: Uses Kaspersky detection technologies locally.
  • Reputation Services: Provides local file and URL reputation checks.
  • Compliance Support: Meets strict regulatory and security requirements.
  • Real-Time Correlation: Correlates events to identify security incidents.
  • Threat Detection: Detects suspicious activity and potential threats.
  • Alerting: Generates alerts for critical security events.
  • Log Management: Stores and manages large volumes of log data.
  • Runtime Protection: Monitors containers for suspicious behavior during execution.
  • Kubernetes Support: Integrates with Kubernetes environments.
  • Vulnerability Detection: Identifies known weaknesses in container images.
  • Policy Enforcement: Applies security rules across container workloads.
  • Virtual Machine Security: Protects VMs from malware and advanced threats.
  • Centralized Management: Manages security policies from a single console.
  • Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
  • System Integrity Monitoring: Monitors critical system changes in cloud environments.
  • Secure Connectivity: Protects data traffic between network locations.
  • Traffic Optimization: Routes traffic based on performance and policies.
  • Centralized Management: Manages all sites from a single console.
  • Link Aggregation: Uses multiple network links for better reliability.
Showing 2017-2064 of 16390 results.
whatsapp