Manufacturers
Video
Today's network environments are becoming increasingly complexProducts Arbor Networks
- A
- Security, Optimization
Arbor Networks (NETSCOUT) is a leading developer of innovative solutions for network and application performance analysis and diagnostics, as well as cybersecurity for network and applications.
Arbor Networks (NETSCOUT) assures digital business services against disruptions in availability, performance, and security. The Netscout product portfolio contains solutions for telecommunications service providers, enterprises, government organizations.
The developer provides a unified monitoring and security platform. The market and technology leadership of Arbor Networks (NETSCOUT) stems from combining unique patented smart data technology with smart analytics. Arbor Networks (NETSCOUT) solutions provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Smart Data technology distills real-time, precise, and relevant intelligence from all connected services and their interactions.
For more information or to order test solutions
Documents
Arbor Networks (EN)
pdfSize: 252.12 KB
Video
Sensibo Sky - Make your air conditioner smartProducts Sensibo
- S
- Smart Technology (IoT)
Sensibo is an innovative crowdfunding company whose products hold a unique position among IoT devices for smart home systems.
The main product line of Sensibo consists of smart controllers for managing climate systems such as air conditioners and heat pumps, with the ability to integrate them into the smart home ecosystem.
Another innovative product from the company is Sensibo Pure, smart air purifiers that feature intelligent sensor technology, automatically improving air quality and allowing control and monitoring through a mobile application.
Video
Stop Cyber Attacks with Vectra AI's Attack Signal Intelligence™Products Vectra
- V
Vectra is a global leader in the use of artificial intelligence to detect and respond to cyberattacks in cloud environments, corporate infrastructures and data centres in real time.
SOLUTION
The solution identifies cyberattacks based on the attacker's behaviour and allows security experts to comprehensively analyse security incidents and to uncover hidden threats with the help of enriched security metadata. The platform collects huge amounts of cloud and network metadata and enriches it with security-relevant information optimised via machine learning. In this way, companies can set the course for efficient and secure operation of their infrastructures and, in the event of an attack, reconstruct the events step by step and look for hidden threats in the network with the help of AI.
Cloud-Native Network Detection & Response
Designed by an award-winning team of data scientists and security practitioners, we holistically approach security by capturing network metadata at scale, enriching it with machine learning-derived security information, and flexibly apply it to power any of your detection-and-response use cases.
PRODUCTS
Vectra AI Platform
What it is: Intelligent, AI-driven threat detection and response for cloud, SaaS, and on-prem footprints
How it works: Vectra AI Platform captures network metadata and enriches it with machine learning-derived security intelligence
Integration: The Vectra AI Platform integrates with EDR, SIEM, firewalls, and native/hybrid cloud solutions
Services: Vectra offers a wide range of services as well as to optimize detection and incident response.
Vectra Stream
Deliver scalable, security-enriched network metadata to feed custom detection & response tools
Vectra Recall
Workbench for AI-assisted threat hunting – from cloud and data centre workloads to the enterprise
Vectra Detect
Automatically detect attacker behaviors and prioritize compromised devices that pose the biggest risk
Vectra Detect for SaaS
See and secure your entire cloud footprint with Vectra AI
Vectra Al is the best find of the NWU company for cyber security of Ukraine
Thanks to the NWU company, which is the official distributor of Vectra Al in Ukraine, you can now buy NDR (Network Detection and Response) from the world leader of the domestic IT market, which is an integral part of the SOC triad.
Buy NDR for SOC or order for testing
Video
Today's network environments are becoming increasingly complexProducts NETSCOUT
- N
- Security, Optimization
NETSCOUT (Arbor Networks) is a leading developer of innovative solutions for network and application performance analysis and diagnostics, as well as cybersecurity for network and applications.
NETSCOUT (Arbor Networks) assures digital business services against disruptions in availability, performance, and security. The Netscout product portfolio contains solutions for telecommunications service providers, enterprises, government organizations.
The developer provides a unified monitoring and security platform. The market and technology leadership of NETSCOUT (Arbor Networks) stems from combining unique patented smart data technology with smart analytics. NETSCOUT (Arbor Networks) solutions provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Smart Data technology distills real-time, precise, and relevant intelligence from all connected services and their interactions.
For more information or to order test solutions
Documents
Arbor Networks (EN)
pdfSize: 252.12 KB
Video
Cynet - XDR
- C
- Security
Cynet 360 AutoXDR™: Comprehensive Protection Platform
Cynet 360 AutoXDR™ is the flagship product that integrates Extended Detection and Response (XDR) with automated security management. The platform enables organizations to respond rapidly to threats using artificial intelligence and machine learning.
Key Features of Cynet 360 AutoXDR™:
- Automatic Threat Detection: Identifies malicious activity across all network components.
- Real-Time Response: Isolates infected systems, blocks access, and eliminates malicious files.
- Integration with Other Systems: Compatible with a wide range of cybersecurity solutions.
- Detailed Analytics: Generates threat reports to enhance security measures.
Cynet MDR: Managed Protection for Organizations
Cynet's Managed Detection and Response (MDR) service provides 24/7 monitoring. Experts analyze actions, mitigate risks, and deliver rapid support to companies lacking in-house cybersecurity teams.
Cynet Deception Technology: Tricking Cybercriminals
The deception technology helps mislead cybercriminals by creating decoy assets resembling actual company resources.
How Deception Technology Works:
- Creates Network Traps: Mimics the company’s infrastructure.
- Captures Malicious Interactions: Logs adversaries' activities with decoys.
- Provides Early Alerts: Detects potential attacks at their onset.
Cynet Incident Response: Rapid Attack Mitigation
Incident response tools enable swift threat assessment and containment. Cynet Incident Response (IR) is user-friendly during crisis situations and helps prevent future incidents.
Key Advantages of Cynet’s Products
- Integrated Solutions for SMBs:
Cynet offers affordable products that combine multiple layers of protection into a single platform, easily integrating with any IT infrastructure.
- High Level of Automation:
Artificial intelligence and automation reduce the workload on IT departments, accelerating threat response times.
- Scalability and Flexibility:
Cynet’s products are adaptable to the needs of organizations of all sizes.
Cynet delivers high-level cybersecurity through innovation and automation. The company continuously enhances its solutions to address modern challenges, ensuring that clients remain protected from cyber threats.
Video
Tufin - The Security Policy CompanyProducts Tufin
- T
- Optimization
Tufin is a company that develops software for automating security policy changes on hybrid platforms, while enhancing security and compliance.
SOLUTIONS
- Automation - automating visibility and reserves, optimizing firewalls, providing flexibility and security advantages throughout the organization, including incorporating security policy recommendations into security workflows, compliance checks, and DevOps pipelines.
- Network security policy management to ensure ongoing compliance with regulatory requirements and internal policies across the entire hybrid network.
- Audit readiness - ensuring audit readiness by demonstrating and documenting adherence to rules and internal policies, including workflows, change history, approvals, and exceptions.
- Risk management - optimizing network segmentation, risk analysis, confidence in applying your security policies across the entire hybrid network, and with all vendors.
- Cloud - secure cloud environments with automated security policy management, automation of network security checks in the CI/CD pipeline for early detection and rapid remediation, as well as continuous compliance, unifying security policy management to ensure consistency across public and private environments, including Kubernetes.
Tufin Orchestration Suit: A Unique Solution for the Ukrainian IT Market in NWU's Portfolio
Tufin Orchestration Suit is a truly advanced and unique solution from a global leader in cybersecurity, now available in the Ukrainian IT market through NWU, Tufin's official distributor in Ukraine. This gives you the opportunity to purchase Tufin in Ukraine. Tufin Orchestration Suit is a coveted solution for SOC teams in any Ukrainian company.
Purchase Tufin or for more information and consultation on the new features of Tufin TOS R24-1, please contact
Video
Huma i Smart introductionProducts Humatech
- H
- Smart Technology (IoT)
Humatech offers high quality sensors developed in-house and produced in Korea, ensuring the most accurate air quality readings and a long service lifetime. The product is the most portable, serious air quality monitor on the market which is no wonder why it is the market leader in South Korea. This tested and highly demanded product is now upgraded with air quality measurements in addition to fine & ultra fine dust (CO2, VOC, Temperature, Humidity) for the US & international markets to ensure that all people across the globe can breathe with peace of mind, for themselves and their loved ones.
Video
uHoo for a Healthy HomeProducts uHoo
- U
- Smart Technology (IoT)
uHoo is a leading international air monitoring company. We help our clients control and understand the quality of the air they breathe, providing them with data, alerts, and insights on creating a healthier and safer environment.
The company was founded by Dustin Jefferson S. Onghanseng and Brian Lin, both of whom suffer from respiratory illnesses and wanted to improve the surrounding conditions in which people live, work, and engage in leisure activities in order to prevent diseases and enhance human health.
The founders met at business school in Hong Kong, where the environment they studied and lived in exacerbated their respiratory conditions. Unable to convince the school that something was amiss with the surrounding environment, the founders eventually devised the uHoo device, abandoned their studies, and established the company. It took them three years of research and development before they finally managed to release the product at the end of 2017.
Video
Nuvap ProSystemProducts Nuvap
- N
- Smart Technology (IoT)
Nuvap is a pioneer in the management of indoor pollution and promotes the Health of People and Healthiness of Built Environment.
Nuvap’s aim is to redefine the standards of quality of life and safety for all its customers, through an innovative platform for monitoring indoor environmental quality.
Thanks to Nuvap’s solutions, it is possible to detect and monitor, in a simple and comprehensive manner, the presence of both chemical and physical pollutants in workplaces, schools, hospitality and health care facilities or other private and public buildings where people sped regularly several hours per day.
The company’s developments are focused on environmental data collection and analysis technologies. Nuvap’s technology is protected by international patents, relating to the exclusive combined and constant monitoring of polluting agents in an indoor environment.
Products Microsens
- M
- Smart Technology (IoT)
We live in a world full of information and an enormous need for rapid data transmission. Fiber optic and building automation technology from MICROSENS offers solutions for various applications in companies, administrations, traffic systems and other institutions.
MICROSENS is one of the world's leading manufacturers of fiber optic transmission systems and solutions for building automation. The company and its specialists have been developing and producing high-performance digital communication systems in Germany since 1993.
MICROSENS develops proprietary software and hardware components for fiber optic transmission systems and building automation. In direct contact with customers and users, IP-based automation solutions emerge for modern buildings, economical network concepts for the office, robust solutions for industrial environments, optical transport systems for future-oriented wide area networks and reliable interconnection of locations and data centres.
Відео
Exabeam SIEMProducts Exabeam
- E
- Security, Control, Hardware solutions, Virtual solutions, Cloud solutions
Exabeam is a Security Orchestration, Automation, and Response (SOAR) solution that enables companies to gather security threat data from various sources, process it to detect threats, and respond to background threats without human involvement. The solution aims to enhance both physical and digital security efficiency.
This is achieved through built-in data collection, planning, tracking, management, and coordination tools for security incident-related processes, automated processing and orchestration, policy enforcement, and subsequent reporting.
Exabeam can function as a fully autonomous solution, performing all functions from data collection and storage of digital event data, data analytics, anomaly detection, and response to identified incidents. It can also complement existing data collection systems such as log collectors or security information and event management (SIEM) systems by adding user and entity behavior analytics (UEBA) and incident response capabilities with integration into existing security tools, transforming the log collection system into a full-fledged SOAR. Additionally, it can also work as a standalone full-featured SIEM system.
Exabeam allows businesses to obtain a vast amount of operational information collected from all devices and presents it in a convenient and easily understandable representation of correlated events without the labor-intensive and time-consuming manual analysis process. In its solution, Exabeam provides its customers with the experience of global companies in security threat detection by offering pre-built detection schemes that can be tailored to specific clients and situations using machine learning. The solution also allows clients to modify or add new schemes according to their needs and even facilitates this process.
Key features and benefits of the solution include:
- Immediate efficiency enhancement
- Works with existing data from access system logs
- Data for analysis is retrieved directly from APIs, Syslog from files, and/or through custom agents
- Automatic activity chronology is provided
- Includes built-in threat detection schemes based on the experience of leading global security services
Assists security operations
- Risk assessment based on dynamic activity prioritizes critical security breaches and high-risk users
- Automated chronicle of all activity across all sessions speeds up investigations and eliminates labor-intensive manual work
- Does not impose licensing restrictions on the sources of collected data
Rapidly detects attacks
Machine learning combined with data processing and analysis automatically creates Stateful User Tracking™, which tracks user activity across sessions, accounts, IP addresses, and devices while preserving relevant information.
Establishes a baseline for normal and risky behavior using a holistic picture of identity information.
Exabeam provides an additional layer of analytics on top of existing SIEM systems, analyzing behavior in ways that are not possible with outdated technologies.
Stateful User Tracking™
Unique among other APP products, Exabeam's Stateful User Tracking™ automates much of the work of highly skilled threat response experts by combining session activity, device, IP address, and identity data. It then creates a behavior baseline for each user, evaluating normal and risky behavior.
This system helps Exabeam detect attacks that bypass traditional security systems and assists staff in assessing and responding to these attacks.
For more information or to order test solutions
- C
CA Technologies (a Broadcom Company) is a major global software and services vendor. It creates systems software that supports and manages mainframe, distributed computing and virtual machine environments, as well as application delivery, security, and data centre infrastructure. It operates primarily in the B2B space and claims that its customers include the majority of the Forbes Global 2,000 companies.
CA Technologies (a Broadcom Company) offers LAYER7® PRIVILEGED ACCESS MANAGEMENT.
Layer7 Privileged Access Management is designed to prevent security breaches by protecting sensitive administrative credentials, controlling privileged user access, proactively enforcing security policies, and monitoring and recording privileged user activity across virtual, cloud, and physical environments. The solution provides a privileged credential vault, session recording, threat analytics, host-based access control for missioncritical servers, and application-to-application password management to address non-human actors, such as applications, configuration files, and scripts.
For more information or to order test solutions
Products Infinidat
- I
- Storage systems
Infinidat was founded in 2011 by a team of storage industry experts focused on returning business value to customers by eliminating the compromises between performance, availability, and cost at multi-petabyte scale for enterprise storage.
INFINIDAT TECHNOLOGY FOUNDATION
Unique to the Infinidat portfolio is the use of a set of fully abstracted software-driven functions. These functions include our Neural Cache, InfiniRaid®, and InfiniSnap® technologies. When layered on top of very low-cost commodity hardware, the result is multi-petabyte enterprise storage solutions with an unprecedented seven nines (99.99999%) availability, high performance, and support for a multitude of workloads at scale.
INFINIDAT SOLUTIONS
Infinidat enterprise storage solutions are installed in Global 500 companies around the world supporting a wide variety of applications and use cases. All of this work was done with a single goal in mind - enable customers to spend less on their infrastructure and focus more on innovation and growth.
ENTERPRISE STORAGE SOLUTIONS FOR THE FUTURE
Today Infinidat supports four enterprise data storage solutions: InfiniBox®, InfiniGuard®, InfiniSync®, and Neutrix Cloud® with an eye towards continuing to support our customers’ continued success.
For more information or to order test solutions
Video
Who is Ribbon?Products Ribbon Communications
- R
- Security
Ribbon Communications is a company with two decades of leadership in real-time communications. Built on world class technology and intellectual property, the company delivers intelligent, secure, embedded real-time communications for today’s world. The company transforms fixed, mobile and enterprise networks from legacy environments to secure IP and cloud-based architectures, enabling highly productive communications for consumers and businesses. With 64 locations in 27 countries around the globe, the company’s innovative, market-leading portfolio empowers service providers and enterprises with rapid service creation in a fully virtualized environment. The company’s Kandy Communications Platform as a Service (CPaaS) delivers a comprehensive set of advanced embedded communications capabilities that enables this transformation.
Direct Routing for Microsoft Teams - make and receive business phone calls
Organizations are already using Teams for video conferencing, file sharing and chat. Microsoft Phone System Direct Routing is the service inside of Teams that allows organizations to connect external phone lines and use Teams as an office phone system.
Ribbon provides the Microsoft certified Session Border Controller (SBC) required to connect Teams to a Communications Service Provider (aka phone lines). Teams uses IP-based voice connections, commonly referred to as SIP Trunks to connect to the rest of the world. Ribbon’s SBCs secure these connections and assure interoperability so organizations can select from hundreds of service providers across the globe.
Organizations can use Teams for all their business calls or slowly migrate from a legacy PBX, depending on their needs. And since Teams clients work on a PC/Mac or smartphone, users can make and receive calls from almost anywhere, on any device, staying connected and productive.
Thanks to NWU, business and communication operators have the opportunity to buy Ribbon SBC in Ukraine and get communication performance and security, as well as to buy SBC SWe - deployment of SBC in the cloud or on your own server.
To buy Ribbon SBC in Ukraine or deploy it for real-time communication applications, as well as get advice on the Ribbon Connect line, Ribbon SBC and integration with Zoom Phone:
Products Beyond Security
- B
- Security
Beyond Security are experts in automated vulnerability testing tools, which are used by customers around the globe including Fortune 100 organizations. Beyond Security tools help device hardening, detection and manage known and unknown security risks and enable compliancy with local regulations. Our tools are known for accuracy, quick setup and management, featuring integrated work flows and framework integration.
3 leading product lines are:
beSECURE: automated vulnerability scanning and risk management, enables data center managers to to protect the critical areas of your network and your custom web-applications. AVDS is also very popular with MSPs, Telecoms for providing automated scanning services for their customers internal and external facing systems
Provides a unique combination of features which maps and scores your network providing a simple step by step workflow showing you in real time which parts of your network and which systems are most vulnerable to attack and exactly where to start your remediation process.
beSTORM: Dynamic Application Security Testing (DAST) and multiprotocol fuzzer. Detects ZERO DAY / Un-Known security vulnerabilities, and robustness issues in all types of software, file structures, and hardware.
- Critical infrastructure: beSTORM is certified by the ISA Security Compliance Institute
- Transportation: powerful tool in the automotive industry detecting vulnerabilities in such devices as: CANbus, drive trains, new generation head-end units, the full range of ECUs and more.
- Microsoft SDL Pro Network: member, specializing in application security
beSOURCE: Static Application Security Testing (SAST), a powerful code analysis tool which bridges the divide between SecOps into DevOps by offering developers and QA teams a reliable and easy to use tool with both on-premises and cloud deployment options. beSOURCE detects security and programming quality issues in your software and provides recommendations to help to make their code faster and more efficient.
For more information or to order test solutions
Video
GTB Data Security that WorksProducts GTB Technologies
- G
- DLP
The leader of Data Protection, GTB Technologies has pioneered & created the most effective security against advanced malware and insider threats for some of the world’s largest enterprises and governments.. GTB's patented, Advanced Data Protection DLP that Works Platform enable its customers to allow the flowing of ideas and collaboration from within the enterprise, through the cloud and social media; while remaining compliant with the comfort that their sensitive, confidential data remains just that ... Confidential.
GTB Advanced Data Protection / Enterprise DLP products actually work and is the ONLY Data Protection / Cloud Application solution which can:
- perform Real-Time Data Classification on Data at Rest & Data in Motion while automatically enforcing data security policies
- support & fingerprint (the most precise detection engine) Multi Terra Bytes of data without "choking" or network degradation
- perform partial file match on Binary data such as Audio, Video, Executable, etc. regardless of file size.
- provide coverage for all 65,000+ channels
- Controls Wireless , SSL Encrypted data, POS, Social Media, Email and Applications such as BOX, Dropbox, Office 365, Google Cloud, Azure & more; on premise & off premises
Unlike others, both on premise, off premise & in the Cloud, GTB Enterprise DLP provides unprecedented, advanced real-time data classification, inspection & detection for accurate control of content thus allowing organizations of all sizes to easily and cost effectively prevent leaks, discover data & advanced threats, enforce policies and compliance while protecting their brand and reputation.
GTB customers' include one of the world's top 5 technology companies along with enterprises across the Global 1000 in sectors such as financial services, healthcare, defense contractors, power and energy, telecommunications, retail, and high-tech, as well as government agencies around the world in defense, homeland security, law enforcement, and intelligence.
For more information or to order test solutions
- T
- Security
ThreatMark is a rapidly growing cybersecurity company aiming to become a global leader in threat detection, smart authentication and fraud prevention.
The idea behind ThreatMark was to create a lightweight, easy-to-use, easy-to-deploy and at the same time effective fraud detection platform, which can support the biggest players in the Industry as well as being deployed in small or medium-sized banks with limited resources. The whole Team is focusing on just one product and leveraging the latest advantages in the cybersecurity.
Anti Fraud Suite (AFS) - solution for digital banking and payments is innovative, feature-rich, and modular. It provides behavioral profiling including behavioral biometrics, transaction risk analysis, and threat detection in one machine learning-based analytics engine.
ThreatMark uses its own research in behavioral biometrics and the latest advances in machine learning to distinguish legitimate customers from cybercriminals, in real time.
For more information or to order test solutions
Products
- C
Cossack Labs builds data security tools that help organizations prevent leakage and misuse of sensitive data and comply with data security regulations. Founded in 2014, Cossack Labs has been developing its core technologies in stealth mode and after thorough testing with early adopters is now commercializing its solutions.
The company provides complete sensitive data lifecycle protection within a customer’s applications in a highly convenient form factor. Our tools take care of encryption, key management, access control, intrusion detection, accountable logging under-the-hood, enabling our customers to focus on their own business, building their software products and systems with confidence that data security has been totally taken care of.
Product lineup: Cossack Labs tools aim at covering the complete lifecycle of the sensitive data in customer’s products, combining cryptography and additional security measures to mitigate most of sensitive data risks data is facing:
Acra: security suite for rapid integration of database encryption and intrusion detection into existing web and distributed applications without significant re-engineering. Provides selective encryption, SQL filtering, leakage detection and prevention.
Toughbase: end-to-end encrypted data lifecycle system for modern distributed applications, providing cryptographic access control and preventing most infrastructure data leakage vectors in a single efficient application framework.
For more information or to order test solutions
Products
Video
Network VisibilityProducts Cubro
- C
- Security
Modern businesses rely on an interconnected IT network to remain operational. Network infrastructure is the backbone of modern business and to ensure seamless business operations and transactions it is crucial to avoid any bottlenecks. Complete network visibility facilitates the transformation by removing ‘blind spot’ and providing control of all data transiting a company’s network.
As a leading manufacturer and global supplier of IT network visibility products, Cubro offers scalable solutions for network monitoring, analytics and security visibility.
What Makes Cubro Different?
- Exceptional customer support
- World-class technical capability
- Solutions with best ‘feature to price’ ratio
- Proven expertise in identifying blind spots
- Unique high-performance product capabilities
For more information or to order test solutions
Video
Niagara Networks - Bringing You Agile VisibilityProducts Niagara Networks
- N
- Security
Niagara Networks™ is a Silicon Valley-based company that is a pioneer in the Open Visibility Platform™, which provides necessary flexibility in network security.
Niagara Networks offers high-performance and reliable solutions for network monitoring and traffic delivery to the most demanding global service providers and corporate environments.
Niagara Networks' solutions are used in the network environments of leading global companies, providing security operations centers (SOCs) and network operations centers (NOCs) with visibility and real-time traffic analysis in both physical and virtual networks.
Niagara Networks transforms the standard level of network visibility into an expanded level of visibility and security interaction. This level allows operational engineers, security engineers, and IT specialist teams to seamlessly perform administration, performance management, monitoring, and other critical network data services.
The level of visibility and interaction is situated at the strategic border of core networks, data processing centers, and remote aggregation nodes. The strategic positioning of this critical level of intermediation allows for regulating and modifying traffic for each necessary security or monitoring device as needed through packet blocking, filtering, aggregation, replication, distribution, tunneling, intelligent load balancing based on flows, and other functions.
The level of visibility and interaction utilizes the distributed processing technology of Niagara Networks FabricFlow™ at all traffic speeds up to 100 Gbps interfaces and a non-blocking distributed switching architecture. With enhancements such as Niagara Networks Packetron™ and highly integrated distributed processing of FabricFlow™, the solution can apply traffic processing such as deduplication, NetFlow metadata, packet and flow slicing, delivering advanced processing capabilities to the visibility level.
Niagara Networks provides all the components to achieve an extensive level of network visibility and interaction at all data transmission speeds up to 100 Gbps. These include advanced packet brokers, bypass switches, network TAPs, and unified management software.
For more information or to order test solutions
Products Endian
- E
- Security
Endian is the leading provider of open source network security and remote connectivity solutions. Our Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive gateway security including firewall, VPN, web and email security services for small to large business networks. The new Endian Switchboard paired with our industrial gateway appliances provide a secure remote access VPN solution for all companies especially those in the industrial market (energy, manufacturing, transportation and communication). The Endian Hotspot solution offers a powerful captive portal solution that can be utilized to securely manage BYOD across your wireless or wired networks. Our company has over 500 partners and distributors selling our solutions in more than 50 countries. Endian is headquartered in Appiano, Italy with offices in North America, Germany, Turkey, and Japan.
For more information or to order test solutions