Orin Corporation
Products and
Technologies
Products that Orin carry
INFINITY - THE MOST COMPREHENSIVE SECURITY
SECURE THE CLOUD SECURE USERS & ACCESS
UNIFIED MANAGEMENT SECURE ACCESS SERVICE EDGE (SASE)
& SECURITY OPERATIONS
Posture Management Network Traffic Analysis
& Visibility • Zero Trust Network Access (ZTNA)
• Secure Web Gateway (SWG)
• Cloud Access Security Broker (CASB)
• Branch FWaaS
Runtime Workload Cloud Access Control
Protection & Prevention
Managed Prevention & Response
EMAIL AND COLLABORATION
Web and API Protection • Account Takeover Protection
• Data Loss Prevention
• Threat Prevention
• Zero Phishing
Multi & Hybrid Cloud SD-WAN
Extended Prevention & Response
SECURE THE NETWORK ENDPOINT AND MOBILE
Enterprise Firewalls Hyperscale Hyper-Fast Firewall Secure OS
Unified Events
• Threat
• Zero Day • App Protection
Prevention
Browser • Network
• Anti-
PORTAL Protection Protection
SMB Suite ICS Security IoT Security Security Management Ransomware
Management & Unified Visibility • Threat • Device
• Forensics
Prevention Protection
• Secure Media
Access Control Wide Range of Firewalls Unified Policy • Zero Phishing
• • • • Access Control
• Advanced Threat • Up to 3 Tbps Throughput • Autonomous Security
Prevention • 1, 10, 25, 40, 100 GbE ports • Event Management Threat Intelligence
• Data Protection • Wi-Fi, DSL, 3G/4G/ LTE • Compliance
COMPREHENSIVE SECURITY VALIDATED BY 3RD PARTY (MIERCOM):
THE BEST PROTECTION AND VALUE TO OUR CUSTOMERS
COMPREHENSIVE SECURITY
WITH FASTEST RESPONSE TIME TO VULNERABILITIES
48X 1The lowest
2 number of known vulnerabilities in the
less High-Profile industry and fastest response time to vulnerabilities
Vulnerabilities (X20 faster than any other company)
32
25X 61 54
Faster Response
66
77
117
# Critical & High SW Vulnerabilities (Last 3 years) Avg. Time To fix Critical & High Vulnerabilities
Source: vendors security advisories web pages & https://tiny.cc/urgency
Updated Dec 1st 22
©2023 Check Point Software Technologies Ltd. 6
30 Years of Recognition
23 times Security Leader in Magic Quadrant
Highest cyber prevention score in Breach Prevention
NETWORK
Highest Block Rate, Lowest Fales positive, Top phishing
prevention
Highest coverage of detected attacking techniques
ENDPOINT
Top Product Scoring: 17.5 / 18
& EMAIL
A leader in Cloud Email Security
MOBILE Highest Mobile security value
CLOUD CloudGuard, Leader in 3 customer choice grids
CHECK POINT INFINITY – YOU DESERVE THE BEST SECURITY
Juniper Leadership
Gartner names Juniper a Leader in the 2023
Gartner® Magic Quadrant for Enterprise Wired
and Wireless LAN Infrastructure.
This is Juniper’s 4th consecutive year as a Leader
in this market.
Juniper has the furthest position of any vendor in
both Ability to Execute & Completeness of Vision.
4 Years a Leader
Positioned Furthest in Execution & Vision
JUNIPER'S ASSISTANCE
13
Intent-based Multivendor support Advanced telemetry, Scalability Intent Time Voyager
Automation and policy assurance, and a Rollback
Continuous Day 0 – single source of truth
Day 2+ Validation (IBN)
14
Rubrik’s Evolution
Designed for the Convergence of Data Protection and Data Security
Pioneer of
Data Security
Pioneer of
Cloud Data Management
Pioneer of
Zero Trust Data Protection Ransomware Monitoring
& Investigation
One Platform (IaaS/PaaS/SaaS)
Zero Trust Architecture Sensitive Data Discovery & Monitoring
Cloud Archival & Recovery Threat Hunting & Monitoring
Immutable Backups
Granular/Orchestrated Recovery
Logically Air-Gapped
Data resilient, optimized, and Data risks continuously
Instant Recovery available for quick recovery monitored and remediated
Business-Driven SLAs
Data secured from insider
threats or ransomware
2014 Present
Widely recognized as leading innovator
2022
Furthest to the Strongest in Five Years Highest Rated VMworld Best
Right in Vision Overall Strategy Running Customer’s Choice of Show
Awards
Data Security Suite
Target Market
• Organizations subject to data protection regulations (e.g. GDPR, PCI-DSS, HIPAA,
etc.)
• Organizations who care about valuable data (e.g. IP)
• Likely targets
• Defense
• Government/Federal
• Finance
• Healthcare
• Energy/utilities
• Manufacturing
• Realistically, all verticals
• Hospitality
• Legal
Fortra Data Security Suite
Understand Govern Protect
What data do I have? How can I control it How can I share
and keep it secure? it risk-free?
HelpSystems Data Security Suite
• Data security platform designed for today’s hybrid IT reality
Data Classification Adaptive DLP Digital Rights
Management
Understand what Enforce DLP and
data is sensitive so compliance Encrypt and control
you can protect it policies without access to files,
interrupting wherever they
business travel
Open XDR
• Open XDR is a unified, AI-powered approach to detection and response, that collects
and correlates all existing security tools, to protect the entire enterprise attack surface
effectively and efficiently. ... The only way to do this is by integrating with existing
security tools.
• Simply, XDR Is Everything Detection & Response
• Open Integrations For All Of Your Tools
• Normalized, Enriched Data
Network Detection & Response (NDR)
• NDR is a native-capability within
the Stellar Cyber Open XDR Platform.
Everything you need to get fully
featured NDR including distributed
sensors, centralized data lake and a
powerful AI Engine. Don't let risk and
threats hide in your network, get NDR
up and running in hours to protect
your enterprise and enforce Zero Trust
at no additional cost.
Deployment
• Cloud native and designed to be
deployed anywhere from the
beginning, Stellar Cyber can meet
any mission requirements. Multi-
tier, multi-tenant and multi-site
functionality built-in. Don't let a
solution dictate your security data
strategy, adopt a solution that
supports your strategy.
HCL Software Solution
• HCL Notes and HCL Domino are the client and server, respectively, of a collaborative
client-server software platform formerly sold by IBM, now by HCL Technologies.
• Total solution with e-mail, chat, meeting, video conferencing, collaboration etc..
• Web e-mail with traveller.
• Big Fix Total patch management solution
• App Scan Dynamic Application Security Testing
Digital Solutions
Domino Sametime
Notes Connections
BigFix AppScan
Highly Scalable Backup &
DATA Migration Solutions
Atempo solutions
END POINT LARGE VOLUMES SERVERS
Continuous Data Protection Backup, synchronization, Data protection for
for laptops, desktops and migration, copy of massive physical and Virtual
file servers unstructured data sets servers, and applications
Lina is a solution for the protection of file servers, laptops and
workstations using a client/server architecture: a Lina server protecting
Lina agents in a network.
Lina Features
Continuous Workstation
Network
Data Protection Recovery Deduplication,
Throttling,
(CDP), (BMR),
END POINT
Continuous Data Protection Backup Support of Centralized
Multi tenant,
for laptops, desktops and Versioning, Open Files, Management,
file servers
Transparent Replication and
backup, Mirroring
A single solution to back up, synchronize, migrate and move your
unstructured data and files between heterogeneous storages.
Miria Features
High FastScan
Seamless
performance Load Balancing Storage
failover
parallelization integration
LARGE VOLUMES
Backup, synchronization, Incremental ACLs Auditing and Metadata and
migration, copy of massive Forever preservation logging open formats
unstructured data sets
Freedom of NAS/Clustered Public cloud
Object storage
vendor’s choice filesystems storage
Tina is Centralized solution for heterogeneous platforms solution to back up
Physical or Virtual Platform across the environment for structured data to Disk
, Tape , Cloud S3…..
Tina Features
Heterogeneous Generic Direct Backup
Centralised
Platform Virtualization to Cloud (S3),
Management
Support agent Tape, Disk
SERVERS Automatic Microsoft Backup
GRT Technology
Data protection for Backup Office 365 Versioning,
physical and Virtual
servers, and applications
Incremental REST API
Forever documentation
Solutions
SAN Storage VTL Disk Backup
IBM Backup LTO tape backup
Fusion of Endpoints at Scale
Enterprise IT is Changingwith Modern
Workforce
New Devices & Applications MakingIT Employees Need Better Connectivity IT TeamRequires Flexibility with
Complex for Management and Security with Simplified Communication Ultimate Security
Requires Seamless Integration within IT Need Better Control, Compliance Need to Increase Workforce Productivity
Systems for Smooth Operations and IT Support with Reduced Maintenance Cost
Multi-Platform Device Management
from a Centralized Dashboard
Manage your entire fleet of smartphones, tablets, laptops, rugged devices, mPOS, and
digital signages running on Android, Apple, Windows or MacOS*.
Apple Android Windows
Manage Apple iOS and Mac Manage Android devices like Manage your Windows 10
devices like iPhone, iPad, iPod mobiles & tablets running devices like Desktops, Laptops
Touch, iPad Pro, MacBook, Android OS. and Surface Pro*.
MacBook Air, MacBook Pro, iMac,
iMac Pro, Mac Mini and Mac Pro.