Perimeter Security

[vc_row type=”full_width_background” full_screen_row_position=”middle” bg_image=”3651″ background_image_mobile_hidden=”true” bg_position=”right bottom” bg_repeat=”no-repeat” scene_position=”center” text_color=”light” text_align=”left” top_padding=”20″ enable_gradient=”true” color_overlay=”#494949″ color_overlay_2=”#010054″ gradient_direction=”top_to_bottom” overlay_strength=”0.8″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-2-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][heading]

Perimeter Security

[/heading][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”0″ overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#595959″ background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” top_margin=”0″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][page_submenu alignment=”center” sticky=”true” bg_color=”#686868″ link_color=”#ffffff”][page_link link_url=”http://4ac.com.mx/home/” title=”HOME” id=”1604095815613-10″ tab_id=”1604095815614-7″] [/page_link][page_link title=”About us” id=”1604095815703-5″ tab_id=”1604095815704-2″ link_url=”http://4ac.com.mx/about-us/”][/page_link][page_link link_url=”http://4ac.com.mx/perimeter-security/” title=”Perimeter Security” id=”1604095815765-1″ tab_id=”1604095815767-0″] [/page_link][page_link title=”SIEM and IDM” id=”1604095815825-7″ tab_id=”1604095815826-10″ link_url=”http://4ac.com.mx/siem-and-idm/”][/page_link][page_link title=”Virtualization y Servers” id=”1604095815886-8″ tab_id=”1604095815888-7″ link_url=”http://4ac.com.mx/virtualization-and-servers/”][/page_link][page_link title=”Services” id=”1604095815944-8″ tab_id=”1604095815945-3″ link_url=”http://4ac.com.mx/services/”][/page_link][page_link title=”Other Tools” id=”1604095816001-10″ tab_id=”1604095816002-9″ link_url=”http://4ac.com.mx/other-tools/”][/page_link][page_link title=”Technical Documentation” id=”1604095816054-10″ tab_id=”1604095816055-8″ link_url=”http://4ac.com.mx/technical-documentation/”][/page_link][page_link title=”Contact” id=”1604095816118-3″ tab_id=”1604095816118-3″ link_url=”http://4ac.com.mx/contact/”][/page_link][/page_submenu][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” top_margin=”30″ width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”full_text”]

At 4AC we sell equipment, licenses and we support the following brands:

[/nectar_highlighted_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#cbcbc3″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”4%” bottom_padding=”4%” id=”intro” enable_gradient=”true” color_overlay_2=”#151519″ gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3290″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”75%”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner content_placement=”middle” column_margin=”default” top_padding=”2%” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”half_text”]JUNIPER[/nectar_highlighted_text][/vc_column_inner][/vc_row_inner][split_line_heading]

With Juniper Connected Security you protect users, applications and infrastructure by extending security to all connection points on the network.

[/split_line_heading][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][vc_column_text]With Juniper, you can communicate and protect your physical or cloud network, all with robust security policies.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”top” bg_image=”2653″ background_image_mobile_hidden=”true” bg_position=”left top” bg_repeat=”no-repeat” bg_color=”#151519″ scene_position=”center” mouse_sensitivity=”5″ text_color=”light” text_align=”left” top_padding=”2%” bottom_padding=”2%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” top_margin=”10″ width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text highlight_color=”#ffffff” style=”half_text”]

Products

[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”10″]

  • Firewalls SRX, vSRX,
  • Switches EX
  • Routing MX series, PTX series, ACX series.
  • SkyATP
  • SD-WAN

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”5px” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” bg_image_animation=”none”][image_with_animation image_url=”3080″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”extra-color-2″][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#cbcbc3″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”4%” bottom_padding=”4%” id=”intro” enable_gradient=”true” color_overlay_2=”#151519″ gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3289″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”75%”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner content_placement=”middle” column_margin=”default” top_padding=”2%” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”half_text”]FORTINET[/nectar_highlighted_text][/vc_column_inner][/vc_row_inner][split_line_heading]

Fortinet offers high-performance network security solutions that protect your network, users, and data from ever-evolving threats. Our broad portfolio of world-class solutions and centralized management enables security consolidation and offers a simplified end-to-end security infrastructure.

[/split_line_heading][vc_custom_heading text=”Security Fabric” font_container=”tag:h4|font_size:20|text_align:left” use_theme_fonts=”yes”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][vc_column_text]The Fortinet Security Fabric platform provides true integration and automation across an organization’s security infrastructure, providing unmatched protection and visibility for every network segment, device, and appliance, whether virtual, cloud, or on-premises.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” bg_image=”2631″ background_image_mobile_hidden=”true” bg_position=”left top” bg_repeat=”no-repeat” bg_color=”#151519″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”2%” bottom_padding=”2%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” top_margin=”10″ width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text highlight_color=”#ffffff” style=”half_text”]

Products

[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”10″]

  • Fortigate
  • FortiAP
  • FortiSwitch
  • FortiADC
  • FortiWeb

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”5px” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” bg_image_animation=”none”][image_with_animation image_url=”3095″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”extra-color-2″][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#cbcbc3″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”4%” bottom_padding=”4%” id=”intro” enable_gradient=”true” color_overlay_2=”#151519″ gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3288″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”75%”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”2/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner content_placement=”middle” column_margin=”default” top_padding=”2%” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”half_text”]CISCO[/nectar_highlighted_text][/vc_column_inner][/vc_row_inner][split_line_heading]

The Cisco Digital Network Architecture (Cisco DNA) is an intent-based unified network architecture that offers advanced solutions for a wide range of enterprise network requirements.

[/split_line_heading][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][vc_column_text]There is a Cisco DNA solution for you, whether your priority is getting 360-degree network visibility or security, or simplifying your wired and wireless access, branch offices, or wide area networks with software-defined networks. Whether you need to optimize access to cloud applications, a mobile workforce, the Internet of Things (IoT), or all three, our solutions are designed for your needs. And they scale from the smallest to the largest implementations. Explore the solutions below to find the ones that best meet the demands of your organization.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” bg_image=”2653″ background_image_mobile_hidden=”true” bg_position=”left top” bg_repeat=”no-repeat” bg_color=”#151519″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”2%” bottom_padding=”2%” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” top_margin=”10″ width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text highlight_color=”#ffffff” style=”half_text”]

Products

[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”10″]

  • Switches Cisco
  • Aironet
  • ISE
  • Stealthwatch

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”5px” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” bg_image_animation=”none”][image_with_animation image_url=”3100″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”extra-color-2″][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#cbcbc3″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”4%” bottom_padding=”4%” id=”intro” enable_gradient=”true” color_overlay_2=”#151519″ gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3108″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”75%”][divider line_type=”No Line” custom_height=”45″][nectar_highlighted_text highlight_color=”#ffffff” style=”half_text”]

Products

[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”10″]

  • Meraki MR – Access Point
  • Meraki MX- Firewalls
  • Meraki MS- Switches
  • Meraki MDM
  • Meraki MG – Gateway

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner content_placement=”middle” column_margin=”default” top_padding=”2%” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_highlighted_text style=”half_text”]Meraki[/nectar_highlighted_text][/vc_column_inner][/vc_row_inner][image_with_animation image_url=”3106″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”extra-color-2″][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#cbcbc3″ scene_position=”center” text_color=”light” text_align=”left” top_padding=”4%” bottom_padding=”4%” id=”intro” enable_gradient=”true” color_overlay_2=”#151519″ gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”3189″ alignment=”” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”50%”][divider line_type=”No Line” custom_height=”45″][nectar_highlighted_text highlight_color=”#ffffff” style=”half_text”]

Products

[/nectar_highlighted_text][fancy-ul icon_type=”font_icon” icon=”icon-ok” color=”Accent-Color” alignment=”left” enable_animation=”true” delay=”10″]

  • Remote Access VPN
  • NAC
  • Virtual ADC

[/fancy-ul][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”fade-in-from-bottom”][nectar_highlighted_text style=”half_text”]Pulse Secure[/nectar_highlighted_text][split_line_heading]

Access applications and resources in the data center or in the cloud. Monitor, visualize users, endpoints, IOT devices, location and behavior. Authenticate: identities, roles, teams with solid and granular administration.

[/split_line_heading][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]

WhatsApp Contáctanos