Alternatives to CacheGuard

Compare CacheGuard alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CacheGuard in 2024. Compare features, ratings, user reviews, pricing, and more from CacheGuard competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cisco Umbrella
    Cisco Umbrella is a cloud-delivered security service that secures internet access and controls cloud application usage across networks, branch offices, and roaming users. The DNS-layer security packages provide protection from malware, phishing, ransomware, and more by analyzing and learning from internet activity patterns to automatically uncover current and emerging threats. It proactively blocks malicious requests before they reach a customer’s network or endpoints.
    Compare vs. CacheGuard View Software
    Visit Website
  • 2
    Bigleaf

    Bigleaf

    Bigleaf Networks

    In our digital-first world, reliable internet is essential for business success. Bigleaf Networks, with advanced SD-WAN architecture and intelligent technology, overcomes traditional network constraints, ensuring seamless connectivity. Bigleaf Networks is more than just a backup; it's a game-changer. Our Cloud Access Network and user-friendly router work together to maximize uptime and optimize cloud application performance. Bigleaf adapts to changing network conditions and traffic needs in real-time, preempting issues before impacting users enabling more productivity. Bigleaf offers control with comprehensive insights, actionable data, and timely alerts, helping you manage your network effectively. Sign up for a free demo to see how we elevate your internet experience, enhance business operations, and give you a competitive edge. With Bigleaf, you don't just stay online; you stay ahead. It's internet connectivity without complexity.
    Compare vs. CacheGuard View Software
    Visit Website
  • 3
    SKUDONET

    SKUDONET

    SKUDONET

    Making business continuity easy through excellence, teamwork, and passion. Achieve perfect load balancing with a flexible Open Source ADC. Effortlessly enhance the security and continuity of your applications with an open-source load balancer that enables you to reduce costs and achieve maximum flexibility in your IT infrastructure. The first project called Zen Load Balancer (ZEVENET) began its public release in October 2010, and we have not stopped refining security, scalability, and high availability technology ever since. Over time, we have built a robust structure for developing SKUDONET into one of the most significant pieces of the market for application delivery. SKUDONET, previously named ZEVENET is an awesome Load Balancer solution with an Open source license, so efficient that other companies forked it. The engineering team is proud to see that others try to copy it, it shows the great work and the great team behind this project.
    Partner badge
    Compare vs. CacheGuard View Software
    Visit Website
  • 4
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions.
    Leader badge
    Compare vs. CacheGuard View Software
    Visit Website
  • 5
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration.
    Leader badge
    Compare vs. CacheGuard View Software
    Visit Website
  • 6
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Partner badge
    Compare vs. CacheGuard View Software
    Visit Website
  • 7
    Turnium SD-WAN

    Turnium SD-WAN

    Turnium Technology Group Inc.

    White-label SD-WAN platform for MSP, ISP, Telecoms and others seeking to deliver reliable, easy-to-use, software-defined, managed network services with a centralized orchestrator, dual-stack IPv4/IPv6 support, packet-based link load balancing for true session continuity with no-dropped calls and wireless/LTE support as well as high-performance (>90%) circuit bonding technology. Provided to you in a unique combination of technical capabilities and business/economic model, build your business by hosting, managing, deploying, and operating your own SD-WAN platform. After your initial setup and training fees, you pay only for the sites you deploy - there's no charge for core node licenses, scale as quickly as you need! Turnium SD-WAN gives you a platform to deliver on your Service Level Agreements. Eliminate connectivity issues that drive complaints, outages, lost time and costs associated with reporting and delivering on SLA. Turnium.com is part of Turnium Technology Group Inc.
    Starting Price: $50 per month
  • 8
    Edgenexus Load Balancer (ADC/WAF/GSLB)
    Choose us because we offer the easiest to use technology without sacrificing features or performance. We back this up with outstanding support and care, delivered under a fair and cost effective pricing model Our technology is used by the smallest startups with big ideas and small budgets all the way to global enterprises and anything in between. We love them all the same! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the Only true ADP Application Delivery Platform where the functionality and lifespan can be enhanced using the app store or applications that you develop in house.
  • 9
    Perimeter 81

    Perimeter 81

    Perimeter 81

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 10
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 11
    Ubuntu

    Ubuntu

    Ubuntu

    Better security. More packages. Newer tools. All your open source, from cloud to edge. Secure your open source apps. Patch the full stack, from kernel to library and applications, for CVE compliance. Governments and auditors certify Ubuntu for FedRAMP, FISMA and HITECH. Rethink what’s possible with Linux and open source. Companies engage Canonical to drive down open source operating costs. Automate everything: multi-cloud operations, bare metal provisioning, edge clusters and IoT. Whether you’re a mobile app developer, an engineering manager, a music or video editor or a financial analyst with large-scale models to run — in fact, anyone in need of a powerful machine for your work — Ubuntu is the ideal platform. Ubuntu is used by thousands of development teams around the world because of its versatility, reliability, constantly updated features, and extensive developer libraries.
  • 12
    iPrism Web Security
    iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. iPrism uses our unique combination of iGuard automated intelligence and expert human analysis to block things like malware, Crypto-Locker and inappropriate sites. It also provides improved user productivity with low latency and false positive rates. This innovative approach ensures you have the most updated, advanced web protection 24/7 that is backed by world-class customer support.
  • 13
    NethServer

    NethServer

    NethServer

    Analyzes all web traffic and blocks selected websites via HTTP and even HTTPS using Squid proxy. Integrated with ClamAV antivirus and site blacklists. Multi-domain web server with ready LAMP stack. Virtual hosting allows to host multiple domain names on a single server. Based on NextCloud provides universal access to your files via the web, your computer or your mobile devices, wherever you are. Provide a private Slack-alternative with Mattermost. Open source messaging platform that enables secure team collaboration. Modern and powerful web interface based on Cockpit that simplifies common administration tasks, very easy and fast installation. Based on CentOS/RHEL, a widespread and popular server distribution, trusted by routine security updates, and rock solid stability.
    Starting Price: €48 per year
  • 14
    illumos

    illumos

    illumos

    illumos is a Unix operating system which provides next-generation features for downstream distributions, including advanced system debugging, next generation filesystem, networking, and virtualization options. illumos is developed by both volunteers and companies building products on top of the software. illumos is an excellent base for both traditional and cloud-native deployments. The OmniOS and OpenIndiana distributions are a good place for new users to get started. You can install in a virtual machine or on bare metal. You need an illumos-based operating system to build illumos. Cross-compilation is not supported. illumos is freely available from our source repository. illumos is the home of many technologies including ZFS, DTrace, Zones, ctf, FMA, and more. We pride ourselves on having a stable, highly observable, and technologically different system. illumos has a proud engineering heritage, tracing it roots back through Sun Microsystems to the original releases of UNIX and BSD.
  • 15
    Atomic ModSecurity Rules
    Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - And much more * Atomicorp developed the first ModSecurity rule set and maintains the largest number of active WAF rules that support server types from Tomcat and Nginx to IIS, LightSpeed and Apache. * Atomic ModSecurity Rules are the most comprehensive WAF rule set in the industry, have the highest level of quality and are fully backed by expert support. ****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ *******
  • 16
    FatPipe WAN Acceleration
    FatPipe Networks' WAN Optimization technology offers the highest performance level of WAN Optimization and optimization available using patented and patent-pending technology. With FatPipe WAN Optimization, you can significantly boost your Wide Area Network performance. This is possible through the acceleration of your applications, and better utilization of your current WAN infrastructure which would ultimately result in saving you thousands of dollars a year on additional hardware, software, and bandwidth costs. FatPipe WAN Optimization appreciably increases WAN utilization, providing effective use of WAN bandwidth by caching/compressing that sharply reduces redundant data on a WAN. FatPipe is the first to market and the only provider of WAN Optimization and optimization technology that can work across multiple WANs. Not only can you optimize your WAN traffic, but you can also achieve the highest level of WAN redundancy and reliability.
  • 17
    Avast Secure Web Gateway
    Block web threats before they hit the network - secure your network traffic without additional proxy servers or on-premise appliances. Filter web traffic and keep unwanted malware away from networks. Secure Web Gateway is simple to deploy and manage across multiple locations, and can be set up in minutes. Devices are automatically directed to the nearest data center for lightning-fast connections from anywhere in the world. Our threat network is geographically dispersed with over 100 data centers, on five different continents, and draws from dozens of top threat feeds that act as vigilant security guards, observing, processing, and reporting on around 30 billion requests per day. When an uncategorized web address is accessed via Secure Web Gateway, the site gets inspected for threats and categorized into one of dozens of categories, resulting in constant updates to the whole security network.
  • 18
    CloudGenix SD-WAN

    CloudGenix SD-WAN

    Palo Alto Networks

    Palo Alto Networks provides an app defined and autonomous SD-WAN solution, enabling the cloud-delivered branch, and reducing enterprise WAN costs. Automate tedious network operations using artificial intelligence for IT operations (AIOps) and machine learning methodologies, reducing network trouble tickets by 99%. Upgrade legacy routers to intelligent, lightweight appliances at the branch, and enable integrated 5G and Zero Touch Provisioning capabilities to reduce manual, labor-intensive branch provisioning. Natively apply best-in-class security to your branches with our proven Cloud-Delivered Security Services that leverage ML-powered threat prevention. Leverage the most complete SASE solution with security and SD-WAN natively integrated and easily added additional services with the CloudBlades API platform.
  • 19
    Secucloud

    Secucloud

    Secucloud

    Secucloud GmbH is active worldwide as a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform particularly for providers. The Elastic Cloud Security System (ECS2) allows a wide range of markets and target groups (mobile communications & landline consumers, small businesses & home offices, SMEs) to enjoy the benefits of enterprise-level security solutions. This innovative platform does not require any special hardware or proprietary appliances, scales automatically, and is capable of supporting more than 100 million users and their connected devices. Secucloud is at the cutting edge of the cyber security industry and has maintained strong partnerships with industry leaders for years, combining their expertise with its own internal innovation cycles. The company is therefore excellently positioned to push the limits of what is possible in the fight against an increasingly complex landscape of cyber threats.
  • 20
    Netskope

    Netskope

    Netskope

    Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one of the world’s largest and fastest security networks, so you never have to sacrifice security for performance. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter. That’s the vision of Netskope. The organic adoption of cloud and mobile in the enterprise presents challenges for security teams when it comes to managing risk without slowing down the business. Security has traditionally managed risk by applying heavy-handed controls, but today’s business wants to move fast without having velocity throttled. Netskope is redefining cloud, network, and data security.
  • 21
    Fastly

    Fastly

    Fastly

    Empower your developers, connect with your customers, and grow your business with today’s leading edge cloud platform. Deliver the best online experiences possible with our edge cloud platform, built to strengthen your current teams and technology. We move data and applications closer to your users — at the edge of the network — to help your websites and apps perform faster, safer, and at global scale. Fastly's highly programmable CDN gives you the freedom to customize delivery right at the edge. Delight your users with the content they want at their fingertips. Our powerful POPs, driven by solid-state drives (SSDs) and hosted in well-connected locations around the world, help us keep more content in cache longer for fewer trips to the origin. Instant Purge and batch purging with surrogate keys let you cache and invalidate highly dynamic content with a mean purge time of 150 milliseconds*. Serve headlines, inventory, or weather forecasts that are always up to date.
  • 22
    Barracuda Web Application Firewall
    Application security is increasingly complex. Barracuda makes it simple. Barracuda Web Application Firewall is a part of Barracuda Cloud Application Protection, an integrated platform that brings a comprehensive set of interoperable solutions and capabilities together to ensure complete application security. Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda Web Application Firewall can defeat today’s most sophisticated attacks targeting your web applications. Barracuda Active DDoS Prevention, an add-on service for the Barracuda Web Application Firewall, filters out volumetric DDoS attacks before they ever reach your network and harm your apps.
  • 23
    Greypanel

    Greypanel

    Greypanel

    Greypanel CDN is an independently-researched and developed dispatching system that intelligently distributes globally-located acceleration nodes to users based on their access location. By assigning the nearest resources to users, GreypanelCDN improves web services capacity, network access quality, download speeds and reduces response time, providing in smoother user experience. Targeted at portals and e-commerce sites, GreypanelCDN caches static content such as web pages, HTML, CSS, JS, images and files onto the nodes to accelerate the distribution process. Visitors will be able to access the content from the nearest node and load complex content in seconds, significantly improving web access speeds and reducing site response time, leading to better user experience. Enjoy a fast, stable and secure dynamic request acceleration with our extensive network of acceleration nodes, a large reserve of direct connections and an intelligent scheduling system.
  • 24
    LineageOS

    LineageOS

    Lineage

    LineageOS extends the functionality and lifespan of mobile devices from more than 20 different manufacturers thanks to our open-source community of contributors from all around the world. Your data, your rules. With powerful tools such as Privacy Guard, you are in control of what your apps can do whenever you want. We take security very seriously, that’s why we deliver security updates every month to all our supported devices. And to make your device more secure, lock everything behind an enhanced lock screen. Our open-source apps are here to help you get through the day. Android developers will turn any device into the perfect device for apps development thanks to enhanced tools and exclusive APIs. LineageOS, an open-source Android distribution, is available for several devices, with more being continuously added thanks to the biggest, yet ever growing, Android open-source community.
  • 25
    MyDiamo

    MyDiamo

    Penta Security Systems Inc.

    Developed by Penta Security Systems, an APAC leader in encryption technology and web application firewall, MyDiamo is a free open-source database encryption solution, available to all for non-commercial use. The commercial license is available for enterprises and organizations that desire extended features.
  • 26
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.
  • 27
    Reblaze

    Reblaze

    Reblaze

    Reblaze is the leading provider of cloud-native web application and API protection, providing a fully managed security platform. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, data center and service mesh), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic. Machine learning provides accurate, adaptive threat detection, while dedicated VPC deployment ensures maximum privacy, performance and protection while minimizing overhead costs. Reblaze customers include Fortune 500 companies and innovative organizations across the globe.
  • 28
    FreeBSD

    FreeBSD

    FreeBSD

    FreeBSD offers advanced networking, performance, security and compatibility features today which are still missing in other operating systems, even some of the best commercial ones. FreeBSD makes an ideal Internet or Intranet server. It provides robust network services under the heaviest loads and uses memory efficiently to maintain good response times for thousands of simultaneous user processes. FreeBSD brings advanced network operating system features to appliance and embedded platforms, from higher-end Intel-based appliances to ARM, PowerPC, and MIPS hardware platforms. From mail and web appliances to routers, time servers, and wireless access points, vendors around the world rely on FreeBSD’s integrated build and cross-build environments and advanced features as the foundation for their embedded products. And the Berkeley open source license lets them decide how many of their local changes they want to contribute back.
  • 29
    Kali Linux
    Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. You can take any Linux and install pentesting tools on it, but you have to set the tools up manually and configure them. Kali is optimized to reduce the amount of work, so a professional can just sit down and go. A version of Kali is always close to you, no matter where you need it. Mobile devices, Docker, ARM, Amazon Web Services, Windows Subsystem for Linux, Virtual Machine, bare metal, and others are all available. With the use of metapackages, optimized for the specific tasks of a security professional, and a highly accessible and well documented ISO customization process, it's always easy to generate an optimized version of Kali for your specific needs. Whether you are a seasoned veteran or a novice, our documentation will have all the information you will need to know.
  • 30
    VyOS

    VyOS

    VyOS Networks

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we access networks so that the many, not the few, benefit from building solutions without limitations and prohibitive fees. We do this as VyOS through our open source software and virtual platforms. Stateful firewalls, zone-based firewall, all types of source and destination NAT (one to one, one to many, many to many). The entire codebase and build toolchain are available to everyone for auditing, building customized images and contributing.
    Starting Price: $1000
  • 31
    KubeSphere

    KubeSphere

    KubeSphere

    KubeSphere is a distributed operating system for cloud-native application management, using Kubernetes as its kernel. It provides a plug-and-play architecture, allowing third-party applications to be seamlessly integrated into its ecosystem. KubeSphere is also a multi-tenant enterprise-grade open-source Kubernetes container platform with full-stack automated IT operations and streamlined DevOps workflows. It provides developer-friendly wizard web UI, helping enterprises to build out a more robust and feature-rich Kubernetes platform, which includes the most common functionalities needed for enterprise Kubernetes strategies. A CNCF-certified Kubernetes platform, 100% open-source, built and improved by the community. Can be deployed on an existing Kubernetes cluster or Linux machines, supports the online and air-gapped installation. Deliver DevOps, service mesh, observability, application management, multi-tenancy, storage, and networking management in a unified platform.
  • 32
    OmniOS

    OmniOS

    OmniOS

    The open-source enterprise server OS with just the features you need. ZFS, OmniOS' native file system, combines a volume manager and file system with strong data-integrity protection. Easily share volumes via iSCSI, CIFS, and NFS. Run lightweight OmniOS or Linux virtual machines in containers without the overhead of a traditional hypervisor and with full resource control. OmniOS also provides full hardware virtualization via bhyve and KVM for running guests such as Microsoft Windows, FreeBSD, and many others. Virtualize your network infrastructure through Crossbow virtual interfaces and switches and even allocate dedicated resources for specific services. DTrace provides a comprehensive dynamic tracing framework to aid troubleshooting across the whole software stack. Always available, instrument anything on demand. OmniOS is open-source, self-hosting, and maintained on GitHub. All development is done out in the open with pull requests and anyone can grab the source and build OmniOS.
  • 33
    SONiC

    SONiC

    NVIDIA Networking

    NVIDIA offers pure SONiC, a community-developed, open-source, Linux-based network operating system that has been hardened in the data centers of some of the largest cloud service providers. Pure SONiC through NVIDIA removes distribution limitations and lets enterprises take full advantage of the benefits of open networking—as well as the NVIDIA expertise, experience, training, documentation, professional services, and support that best guarantee success. NVIDIA provides support for Free Range Routing (FRR), SONiC, Switch Abstraction Interface (SAI), systems, and application-specific integrated circuits (ASIC)—all in one place. Unlike a distribution, SONiC doesn’t require reliance upon a single vendor for roadmap additions, bug fixes, or security patches. With SONiC, you can achieve unified management with existing management tools across the data center.
  • 34
    Mbed OS
    Arm Mbed OS is a free, open-source IoT operating system that includes all the necessary features to develop IoT products. The OS includes everything you need to develop smart, connected products on Arm Cortex-M based hardware, including machine learning capabilities, security, connectivity stacks, an RTOS kernel and drivers for sensors and I/O devices. Arm Mbed OS is designed for the Internet of Things. It is integrated with connectivity, machine learning, networking, and security stacks and is supported with software libraries, development hardware, tutorials and examples. From hardware to the cloud, Mbed OS supports more than 70 silicon, module, cloud, and OEM partners, optimizing your developer choice. By using the Mbed OS API, your application code can remain clean, portable, and simple, while taking advantage of security, communications and machine learning. The integrated solution reduces development cost, time, and risk.
  • 35
    DANOS-Vyatta

    DANOS-Vyatta

    IP Infusion

    DANOS-Vyatta edition NOS is aligned with Open Compute Project in delivering a cell site gateway router (CSGR) use case. As mobile service providers make the transition from legacy technologies toward 5G RAN technologies, the CSGR is designed to address the changing needs of operator’s backhaul transport requirements. Based on the DANOS open source software, DANOS-Vyatta edition is a production-ready, carrier grade, feature-rich network operating system (NOS) that meets the demand for functionality and reliability required in the carrier environment. Highlights of DANOS-Vyatta edition The NOS architecture is designed for abstractions with clean APIs between the layers for development agility, troubleshooting and ease of supporting multiple white boxes. The application layer encompasses all the routing and supporting processes along with the standard APIs and familiar CLI interface for operators and management, automation, orchestration systems to interact with the NOS.
  • 36
    Forcepoint WebShield

    Forcepoint WebShield

    Forcepoint WebShield

    Secures HTTP traffic throughout the enterprise and provides access to web-based resources on less sensitive networks. Forcepoint WebShield, a Commercial-Off-The-Shelf (COTS) data guard, provides secure Web search and browse-down capabilities from high-side networks to lower-level networks. WebShield supports the missions of the largest number of cross domain transfer users as a secure mechanism for complete information browsing and discovery. WebShield provides transparent protection of the entire network and allows users to carry out their missions with increased protection. Users surfing lower-level networks can be restricted to specific server and file types as defined by security policies. All requests, responses and transfers go through security controls, such as dirty word search, virus scan and malicious content checks. Forcepoint WebShield is an approved cross domain transfer solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.
  • 37
    ProxySG and Advanced Secure Gateway
    Symantec delivers high-performance on-premises secure web gateway appliances that protect organizations across the web, social media, applications, and mobile networks. Combine with cloud-delivered Web Security Service for a centrally-managed, hybrid secure web solution. Symantec protects organizations with a scalable, high-performance web proxy appliance designed to secure communications from advanced threats targeting web activity. Symantec Secure Web Gateway solutions draw on a unique proxy server architecture that allows organizations to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience. Get complete visibility into SSL/TLS-encrypted web traffic with Symantec's advanced secure web proxy and cloud security solutions. Symantec Web Isolation prevents websites from delivering zero-day malware, protects users' devices by executing web sessions away from endpoints, and safely sends rendering information to the browser.
  • 38
    DDoS-GUARD

    DDoS-GUARD

    DDoS-GUARD

    DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets since 2011. Unlike most of other companies, we provide services using our own network of scrubbing centers having sufficient channel and computing capacities to process high volumes of traffic. We do not resell other companies' services claiming them as our own. Today's digital world shows us ever-increasing number of cyber threats. Abreast of the latest trends, the number of DDoS attack types is increasing too. Besides, the attacks themselves become more volumetric, complex and varied. Realizing that, we are constantly modifying traffic scrubbing algorithms, increasing channel capacity, add computational resources to traffic processing centers. It allows us not only provide protection against all known DDoS attack types to our customers, but also detect and block any previously unknown anomalous network activity.
    Starting Price: $30/month
  • 39
    Barracuda Web Security Gateway
    The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield.
  • 40
    SonicWall WAN Acceleration
    Eliminate performance bottlenecks from data and file sharing applications and give users LAN-like application performance, with WAN optimization. By transmitting only new or changed data, SonicWall WAN Acceleration Appliance (WXA) WAN solutions optimize the bandwidth you already have. Integrate WXA hardware, software or virtual appliance with a SonicWall firewall to minimize and prioritize app traffic. Designed for small- to medium-sized organizations with remote and branch offices, the WXA 2000 significantly enhances WAN application performance and user experience for up to 120 users, with 600 concurrent flows. Designed for small- to medium-sized organizations with remote and branch offices, the WXA 4000 significantly enhances WAN application performance and user experience for up to 240 users, with 1,200 concurrent flows. As a hardened, performance-optimized virtual server, the SonicWall WAN Acceleration Virtual Appliance (WXA) 5000 eases migration and reduces capital costs.
  • 41
    Symantec Secure Web Gateway
    Security architectures are becoming more stressed with network traffic merging onto the web and into cloud apps such as Office 365. Your data—and your security—has to follow wherever your employees go. Defend your enterprise with an advanced cloud-delivered network security service that’s highly scalable, high performing, cost-effective, and simple to use. 'Direct-to-net' security reduces web traffic backhauls to corporate data centers and protects your entire enterprise, especially remote and branch offices, and mobile users. Software Defined Perimeter gives users access to corporate applications, regardless device type, use or location, without adding complication or security risk. Security policy automated alignment, performance acceleration, security policy enforcement, and other optimizations secure Office 365 traffic.
  • 42
    StreamGroomer

    StreamGroomer

    Streamcore

    StreamGroomers monitor and regulate the traffic across Wide Area Networks (WAN). StreamGroomers integrate transparently, regardless of network architecture, between the LAN and WAN access router and are administered via an out-of-band management network. Continuous service is ensured using high-availability architectures. StreamGroomers analyze network traffic at wire speed, collecting comprehensive measurements and packet data at distributed points in your network. Indicators are calculated from this data in real-time to show current network performance. This data is aggregated and sent to a central repository with minimal network overhead, enabling fast drill down analysis and troubleshooting as well as providing detailed records for forensics. The StreamGroomer’s Deep Packet Inspection analyzes Layer 2-7 packet data to identify applications and user sessions against a predefined catalog of 400+ services.
  • 43
    Aryaka

    Aryaka

    Aryaka Networks

    Aryaka is a Cloud-First WAN company. With its optimized global network and innovative technology stack, it offers the industry’s #1 managed SD-WAN delivered as a managed service. Bringing agility, simplicity and choice to customer networks, Aryaka sets the gold standard for application performance. Its portfolio of SmartServices include connectivity, application acceleration, security, cloud networking and insights powered by its powerful SmartManage service automation and orchestration. Aryaka has hundreds of customers globally across different industry verticals including several in the Fortune 100.
  • 44
    Riverbed SteelHead

    Riverbed SteelHead

    Riverbed Technology

    SteelHead is the industry’s #1 optimization solution for accelerated delivery of any application across the Hybrid WAN. With SteelHead WAN optimization, you have better visibility into application and network performance and the end user experience. By combining network, application and end user performance metrics for deep visibility, IT can troubleshoot and fix problems before the user is impacted. Leveraging the solution’s application-aware approach, the most complete set of network services and path selection based on intent-based, business-driven, global policies with local enforcement, you also have significantly improved control to enable business agility.
  • 45
    Fortinet SD-WAN
    Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere.
  • 46
    Lumen SD-WAN

    Lumen SD-WAN

    Lumen Technologies

    Unleash your network potential with Lumen SD-WAN Solutions featuring automated security, optimized performance and intelligent scalability for driving digital innovation. Lumen SD-WAN solutions help reduce complexity and risks of network transformation by securing and coordinating workloads across the full range of connectivity types on a single, automated platform with centralized visibility and control. Learn how to streamline your network operations with SD-WAN. With its unique cloud gateway architecture and innovative Dynamic Multipath Optimization™ (DMPO) capabilities, Lumen SD-WAN with VMware delivers reliable, secure high-performance access to voice, video and other business-critical applications from branch to data center to cloud at scale. Build branch connectivity in minutes with scalable management components designed to support mid- to large-sized organizations.
  • 47
    ExtremeCloud SD-WAN

    ExtremeCloud SD-WAN

    Extreme Networks

    ExtremeCloud SD-WAN uses Application Intelligence+ to pave the way for unprecedented application performance on your network. Our solution is the only SD-WAN with application intelligence that can transform your unpredictable network into a great user experience. By defining the quality of experience (QoE) you want for your business-critical apps, ExtremeCloud SD-WAN controls each user session automatically and dynamically, regardless of network conditions. Unlike other SD-WAN solutions, ExtremeCloud SD-WAN uses true end-to-end Quality of Service (QoS), independent of your underlying network, to deliver high performance for every user, at every location, every time. When your application performance is aligned to your business objectives, users can maximize their productivity and enjoy greater satisfaction from digital transformation without contacting the help desk, all at a reduced cost. That's ExtremeCloud SD-WAN with Application Intelligence+.
  • 48
    Cisco SD-WAN
    Cisco SD-WAN (formerly Viptela). Any user, any application, anywhere in the world. SD-WAN is a software-defined approach to managing the wide-area network, or WAN. Extend intent-based networking across the branch, WAN, and cloud. Connect any user to any application. Our industry-leading solution for multicloud transformation offers integrated capabilities for security, unified communications, and application optimization. Increase user productivity by optimizing cloud and on-premises application performance with real-time analytics, visibility, and control. Protect users, devices, and applications with embedded or cloud security and lays the foundation for secure access service edge (SASE). Centralize cloud management to make it easy to deploy SD-WAN and security while maintaining policy across thousands of sites. With a cloud-first architecture, maintain flexibility to connect any user to any application, across any cloud.
  • 49
    Exinda SD-WAN

    Exinda SD-WAN

    GFI Software

    Combine and intelligently manage up to 12 Internet transports (such as MPLS, T1, DSL, Cable, fiber, satellite or 3G, 4G, LTE) from any of your service providers. The Exinda SD-WAN network router can monitor, detect and adapt against the fluctuations in your ISP performance as well as your changing traffic profile. Solve network problems automatically and avoid interruptions to your Internet services and applications. If you rely on a single service provider, you are dependent on a single SLA. By aggregating service providers, you can build your own best-in-class bandwidth solution. Leverage cable modems’ bandwidth, DSL’s dedicated last-mile transport, and the low latency of MPLS—all packaged together.
  • 50
    DNSFilter

    DNSFilter

    DNSFilter

    The world's fastest DNS based threat protection and content filtering service, powered by artificial intelligence.