IT Security Slider Image

IT Security

Home > IT Security

IT Security Distribution

FineTech is a leading regional IT security, application delivery network and video communications solutions distributor for M-Tech. Established in May 2002, M.Tech is headquartered in Singapore and has a network of 33 offices in 17 countries, namely in Singapore, Australia, Cambodia, China (including Hong Kong), India, Indonesia, Japan,Korea, Malaysia, Myanmar, New Zealand, Philippines, Sri Lanka, Taiwan, Thailand, United Kingdom and Vietnam. Finetech together with M-Tech provides on-site sales, marketing as well as technical support to its reseller partners. The partner network has been growing well in terms of capacity and revenue.

m-tech-1
m-tech-2
m-tech-3




SI No Product Logo Products Product Overview
       
1 1 Allot Allot Communications is a leading global provider of intelligent broadband solutions that put mobile, fixed and enterprise networks at the center of the digital lifestyle. Allot’s DPI-based solutions identify and leverage the business intelligence in data networks, empowering operators to shape digital lifestyle experiences and to capitalize on the network traffic they generate.
2 2 Apcon APCON, Inc. is a pioneer in the field of switching technology and is globally recognized as the leading provider of packet aggregation switching solutions. Organizations in over 40 countries currently depend on APCON solutions in their network infrastructures. Customers include Fortune 1000 companies, and networking and computer OEMs, as well as government and military organizations, telecommunication and service providers, financial services firms, and medical companies.
3 3 Arista Arista Networks was founded to deliver software defined cloud networking solutions for large data center and high-performance computing environments. With more than one million cloud networking ports being deployed worldwide, Arista delivers a portfolio of 1/10/40 and 100GbE products that redefine network architectures, bring extensibility to networking, and dramatically change the price/performance of data center networks.
4 4 Arbor A global leader in network security. A hub for Internet-wide research. An exciting place to work. Arbor was founded out of groundbreaking research conducted at the University of Michigan. This research was eventually funded by the U.S. Defense Agency Research Projects Administration (DARPA). Out of that research, Arbor Networks was created in 2000. Since then, Arbor has focused exclusively on researching, detecting and mitigating network-based threats. The company is best known for its pervasive footprint in service provider networks. Arbor technology is deployed in 70% of service provider networks globally, including 90% of tier one operators. Arbor technology is also broadly deployed among the largest hosting and cloud providers.
5 5 BackBox Used to take configuration backups & alerts. A single view of all networking & Security applications & devices highlights devices that were not recently saved. It’s a unique multi-check engine.
6 6 Barracuda Barracuda Networks, Inc. offers industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Our products span three distinct markets, including: 1) content security, 2) networking and application delivery, as well as 3) data storage, protection and disaster recovery.
7 7 Beyondtrust Privilege Management & Vulnerability Management Software SolutionsBeyondTrust provides context-aware Privileged Account Management and Vulnerability Management software solutions that deliver the visibility necessary to reduce IT security risks and simplify compliance reporting.
8 8 Bluecoat ProxySG – provides complete control over all your web traffic with robust features that include user authentication, web filtering, data loss prevention, inspection and validation of SSL-encrypted traffic, content caching, bandwidth management, stream-splitting and more.PacketShaper – Content-aware visibility and control over your entire network and applications.

MACH 5 – Wan Optimization

SOLERA – SIEM

9 9 Citrix Netscaler – Application Availability, Server/Global Server Load Balancing, Acceleration, Application FirewallAccess Gateway – SSL VPN

Citrix Virtalization – Xen Server, Xen App , Xen Desktop

Citrix MDM – XenMobile

10 elf Elfiq Elfiq Link Balancer Product Family
Elfiq Networks® enables organizations to ensure business continuity and improve network performance through innovative link balancing and bandwidth management technologies by optimizing the use of multiple concurrent ISPs
11 11 HP Enterprise Security TippingPoint IPS – Intrusion Prevention SystemFortify – Identify vulnerabilities throughout the application lifecycle with static, dynamic or integrated application testing. automate the management, tracking, remediation, and governance of enterprise software risk.
12 12 Imperva WAF – Web Application Firewall.File Security – FAM(File Activity Monitoring) & FF (File Firewall).

Database Firewall – DAM(Database Activity Monitoring) & DAF(Database Firewall)

13 13 Ixia Ixia’s award-winning solutions are used worldwide by network equipment manufacturers, service providers, enterprises, and governments to: Assess and optimize network performance, validate compliance, and harden security. Gain visibility into network applications and services to accelerate troubleshooting and enhance monitoring performance. Harden mission-critical networks against attack and train personnel to recognize and eradicate vulnerabilities. Improve performance, security, and application delivery of cloud, data center, and network services.
14 14 Lumension Endpoint Management and Security Suite – enables you to take control of your endpoints through an agile solution suite that simplifies systems management, expands operational visibility and delivers more effective IT security
15 15 MobileIron Mobile Device ManagementAdvance Management – Get multi OS Mobile operations under control.

Mobile activity Intelligence – Monitor real time call activities.

16 16 Nutanix Nutanix virtual computing paltformConverged compute and storage appliance runs virtual, workloads out-of-the-box, Eliminates the SAN to reduce costs and improve IT agility Incorporates the same distributed software architecture, powering Google and other public cloud infrastructures, Delivers linear and seamless scale-out with, pay-as-you-grow flexibility
17 17 PaloAlto This is a next generation FirewallFirewall which enables visibility and control of applications, users, and content
18 18 Proofpoint Email Security – AV & AS, Email Firewall, Zero-hour AV, Reputation.DLP – Email DLP

Email Achieving – Secure Messaging, Secure File Transfer

Email Encryption

19 19 Riverbed Steelhead -(WAN Optimization) DC/DR Replication, IT consolidation, multiple branches, Mobile users.Cascade – Real Time Traffic monitoring, Application visibility.

Stingray – Application Delivery Controller

Granite – branch office consolidation

Whitewater – Storage on cloud

Optnet – Networking performance monitoring, App monitoring

20 20 RSA SecurID – 2 factor authentication.
Security Analytics – Security Information & Log management ( Covers enVision & Netwitness Features)
Data Leak Prevention – Endpoint, Network and datacenter level
21 21 Skybox Skybox Security provides cutting-edge risk analytics for enterprise security management. This solutions give you complete network visibility, help
you eliminate attack vectors, and optimize your security management processes. Protect the network and the business.
1. Increase network visibility and intelligence with Skybox risk analytics
2. Eliminate attack vectors – prioritize and remediate risks rapidly
3. Optimize security processes – integrate and automate complex tasks
22 22 Solarwinds SolarWinds is an Network & Application Monitoring Tool
NPM – Network performance monitoring
NTA – Network Traffic Monitoring
NCM – Network Configuration Monitoring, Asset Management
SAM – Server & Application Performance Monitoring
IPAM – IP Address Management, Manages the IP
23 23 Sourcefire Sourcefire is a next-generation security platform that can be deployed based on customers’ unique needs:
Sourcefire Next-Generation IPS (NGIPS): Sets a new standard for advanced threat protection, integrating real-time contextual awareness,
intelligent security automation, and unprecedented performance with industry-leading network intrusion prevention.
24 24 Tectia/SSH Guardian – Controlling and Auditing Remote system Access
Mobile ID – 2 factor authentication
ConnectSecure – Securing file transfers & application traffic
25 25 Tufin SecureChange Workflow – Security Change Automation
Secure Track – Firewall Operations & Auditing
26 26 Vilion Violin Memory is pioneering the future of flash storage in the enterprise data center. Violin flash Memory Arrays deliver storage at the speed of
memory, accelerating business critical applications and enabling fully virtualized and optimized IT infrastructures. Designed for sustained
performance with high reliability, Violin flash Memory Arrays scale to hundreds of terabytes and millions of IOPS with low, spike-free latency.
27 27 Vormetric Vormetric Encryption for Databases – Encrypting sensitive information in databases is not longer an option
File Encryption – addresses the need to secure sensitive files throughout the distributed enterprise
Key Vaulting – provides the ability to store encryption keys of any strength, symmetric or asymmetric
28 28 Watchdox Document Centric – Manages the document security