infocentric ph

ENTERPRISE NETWORKING AND WIRELESS & MOBILITY

Serves as the backbone of communication for the organization.

  • SD WAN
  • Routers & Switches
  • Access Points
  • Network Management
  • Network Analytics & Assurance
  • Gateways & Controllers
  • Network Performance Monitor
  • NetFlow Traffic Analyzer
  • Network Configuration Manager
  • Patch Manager
  • Database Performance Analyzer APT Prevention
  • Virtualization Manager
  • Web Performance Monitor
  • Server & Application Monitor
  • SD WAN
  • Routers & Switches
  • Access Points
  • Gateways and Controllers
  • Network Management
  • Network Security
  • Wireless & Mobility
  • Cloud Management (Meraki)
  • Network Visibility & Analytics
  • Threat Detection & Response
  • Network Optimization
  • Device Visibility for Campus, IoT, Data Center, Cloud & OT Network
  • Next-generation NAC Solution
  • Asset Management & Device Compliance

NETWORK SECURITY

Protecting the usability and integrity of your network and data.

  • Next Generation Firewall
  • Secure SD-WAN
  • Secure Web Gateway
  • Intrusion Prevention System
  • Email Security
  • Endpoint Security
  • Unified Threat Management
  • Secure SDN-WA
  • Endpoint Security
  • Advance Malware Protection
  • Next Generation Firewall
  • IP Sec VPN & SSL VPN
  • Data Protection & Encryption
  • Data Loss Prevention
  • APT Prevention
  • Endpoint Security
  • Web Isolation Service
  • Document Isolation Service
  • Phishing Isolation Service
  • SD WAN
  • Routers & Switches
  • Access Points
  • Gateways and Controllers
  • Network Management
  • Network Security
  • Wireless & Mobility
  • Cloud Management (Meraki)

ENDPOINT SECURITY

Secure all points of entry to the network.

  • Endpoint Security
  • Web Security
  • Intrusion Prevention System
  • Threat Intelligence
  • Cloud Access Security Broker
  • Anti-Virus
  • Anti-Malware
  • Internet Security

DATA CENTER

Central and secure infrastructure point to ensure reliable access to data

  • Converge Infrastructure
  • Hyperconverge Infrastructure
  • High Performance Computing
  • Artificial Intelligence
  • Converge Infrastructur
  • Hyperconverge Infrastructure
  • High Performance Computing
  • All Flash & Hybrid Storage
  • Big Data & Analytics
  • Artificial Intelligence
  • High Performance Computing
  • Cloud Solutions
  • Hyperconverge Infrastructure
  • Virtualization & Cloud
  • Automation & Orchestration
  • Big Data
  • Hyperconverge Infrastructure
  • Enterprise Servers
  • Scale-out Servers
  • Accelerated Servers

DATA PROTECTION (BACKUP) AND HIGH AVAILABILITY

Ensure data availability through backup and recovery.

  • Data Protection
  • Replication & Recovery
  • Backup & Disaster Recovery
  • Orchestration & Business Continuity
  • Cloud Data Management
  • Virtualization
  • Software Defined Data Center

SMART AND SAFE CITY

Enhanced city services and quality of life through data-driven decision making and automation.

  • Surveillance
  • Access Control
  • Transmission & Display
  • Parking Management
  • Intelligent Video Analytics
  • Terrestrial Trunked Radio System
  • Push-to-Talk Mobile Application
  • Dispatch System
  • Indoor & Outdoor Base Stations
  • Rapid Deployable Base Stations
  • Digital Mobile Radio System
  • Terrestrial Trunked Radio System
  • Log Management
  • Voice & Computer Aided Dispatch
  • Push-to-Talk Mobile Application
  • Multi Network Voice Dispatch System
  • Integrated Fixed Dispatching System (AVLS/APLS)

COLLABORATION

Increase employee productivity by ensuring constant free-flowing communication

  • Video Conferencing Endpoints
  • Conferencing
  • IP Telephony
  • Unified Communications
  • IP Telephony
  • Collaboration Software & Tools

IDENTITY ACCESS MANAGEMENT

  • Identity Management IdM
  • Access Management
  • Access Control
  • Audit Compliance
  • Incident Response
  • Remote Workforce/Secure Remote Access
  • Service Account Management
  • Zero Trust/Least Privilege
  • Customer Identity
  • Workforce Identity
  • Privileged Password Management
  • Secure Remote Access
  • Endpoint Privilege Management
  • Cloud Security Management
  • Modernize Legacy IGA
  • Multi-Cloud Governance
  • Workforce Identity
  • Machine Identities
  • Continuous Compliance
  • Zero Trust Identity
  • Privileged Access Management
  • Access Management
  • Threat Intelligence
  • Authentication
  • Orchestration
  • Compliance

SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

  • Advanced Threat Detection
  • Application Modernization
  • Cloud Migration
  • Incident Investigation and Forensics
  • IT Modernization
  • SOC Automation and Orchestration

VULNERABILITY ASSET MANAGEMENT

  • Threat Intelligence
  • Vulnerability Management
  • Dynamic Application Security Testing
  • Orchestration & Automation
  • Cloud Security
  • Valuation
  • Compliance and Regulation
  • Corporate Finance and Restructuring
  • Cyber Ris
  • Environmental, Social and Governance
  • Investigations and Disputes
  • Digital Forensics and Incident Response
  • Incident Preparedness
  • Dark Web Investigations
  • Governance, Risk and Compliance
  • Penetration Testing

DATA LOSS PREVENTION AND GATEWAY SECURITY

  • Data Security
  • Network Security
  • Data loss Prevention
  • Monitor and enforce in real time
  • Inspect data in-line with full SSL inspection
  • Create flexible, customizable policies with 80+ pre-built dictionaries
  • Get detailed data loss incident reporting
  • Meet compliance requirements
  • Endpoint Security
  • SecOps and Analytics
  • Data Protection
  • Network Security
  • Email Security
  • Cloud Security
  • Email Security and Protection
  • Advanced Threat Protection
  • Cloud Security
  • Compliance and Archiving
  • Information Protection
  • Digital Risk Protection
  • Network Security
  • Cloud Security
  • Secure Users and Access
  • Unified Management

DATABASE ENCRYPTION

  • Data Security
  • Network Security
  • Robotic Process Automation
  • Workload Automation
  • Infrastructure Automation
  • Data Security
  • Digital Rights Management
  • Infrastructure Protection
  • Identity & Access Management

THREAT INTELLIGENCE

  • Threat Visibility and Intelligence
  • Digital Risk Discovery
  • Cyber Defence Mobile App