Security Products

To complement our suite of security services, Sword & Shield offers a full line of enterprise-class security products. Offering solutions in authentication, encryption, security management, and wireless security, we place our name and reputation only beside the highest quality security products delivered by industry respected manufacturers.

Products Renewal Program

Are you tired of maneuvering through multiple vendors to renew license and maintenance contracts? Through our Products Renewal Program we manage all of your license renewals and maintenance contracts. We provide you with a single point-of-contact rather than multiple account executives and product managers at several vendors. This results in an overall cost and time savings to your organization.

We Can Help

What challenge does your organization face?


Backup & Archiving
Backup & Archiving

Backing up your data is one of the most basic security measures. Backup locally, or backup to a hosted service. Archiving email is important as part of your preparations for electronic discovery.

BYOD/Mobile Management
BYOD/Mobile Management

The Consumerization of IT is reshaping the way companies purchase, manage, deliver, and secure their mobile assets. These products can help your organization effectively and efficiently manage the mobile computing environment.

Data Loss Prevention (DLP)
Data Loss Prevention (DLP)

Use DLP products to discover the location of sensitive data in your enterprise and monitor its movement. DLP is increasingly becoming part of regulatory compliance for sensitive information.

Encryption
Encryption

Encryption products for sensitive information. Encrypt email, sensitive files, or entire hard drives. With recent news about sensitive data being lost on laptops, encryption is becoming a crucial need.

Endpoint Security
Endpoint Security

Endpoint Security products secure PCs and laptops. Most products include a personal firewall, IDS, and typically offer anti-virus and anti-spyware protection. For encryption products please visit our Encryption department.

Firewall & VPN
Firewall & VPN

Firewalls protect your network from outside attack while allowing your organization to access the Internet and other networks. Virtual private networking (VPN) allows employees and branch offices to securely access your network from across the Internet. We’re proud to offer both of Gartner’s top picks for firewalls – CheckPoint and Juniper.

Identity & Access Management
Identity & Access Management

Tools for identity and access management. Use these tools to positively verify identity and manage network access. Two-factor Authentication Smart Cards and Tokens Biometrics Network Access Control

IDS & IPS
IDS & IPS

These products monitor intrusion attempts and port scans of your network. Intrusion detection is your inside defense to detect hackers who have penetrated your outside defenses, such as firewalls and proxy servers.

Insider Threats
Insider Threats

Tools and audits engineered to protect your organization from your employee’s intentional or unintentional actions.

Log Management & SIEM
Log Management & SIEM

Logging tools to help identify and respond to network attacks, suspicious behavior and policy violations.

Password Management
Password Management

With endless news stories detailing the latest security breaches, a strong, unique, and often-changed password for every site is even more imperative. A password manager can help you attain that goal. Password managers store your login information for all the web assets you use and help you log into them securely.

Routing, Switching & Firewalls
Routing, Switching & Firewalls

The need to connect and collaborate with partners, customers, and remote/mobile employees anytime and anywhere has expanded network connectivity requirements beyond traditional networks. Organizations of all sizes want secure network connectivity to their business data and applications, and these products can help expand your network while maintaining a security focus.

Scanning & Auditing
Scanning & Auditing

These products scan your network for vulnerabilities. Specific products are available for scanning databases and ensuring that the workstations and servers on your network are in compliance with your organization’s security policy. For Web server scanning, see Web Server Security.

Web and Email Filters
Web and Email Filters

These tools filter inappropriate emails and/or spam. Use them to stop malware, reduce potential liability, conserve your Internet bandwidth, increase productivity, and protect minors.

Web Filters
Web Filters

These tools filter inappropriate web pages. Use them to reduce potential liability, conserve your Internet bandwidth, increase productivity, and protect minors. See also Email & Spam Filters.

Web Server Security
Web Server Security

Web servers are becoming the #1 source of Internet attacks in many organizations. Securing Web applications against malware and code injections is a critical piece of today’s layered defense.

Wireless Security
Wireless Security

Wireless is an increasing boon to productivity and convenience and an increasing security risk. These products secure wireless connections against exploits.