CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

CGS Tower Networks / Represented by Zenya Technology

CGS Tower Networks / Represented by Zenya Technology

CGS Tower Networks / 總代理:辰亞科技

CGS Tower Networks / Represented by Zenya Technology Info

Booth Number:B55

Optimize Your Network with Our Unique Disaggregation Approach

CGS Tower Networks optimizes cyber security, Big Data analytics, and monitoring applications deployed on both physical and virtual platforms, by eliminating network blind spots and reducing data overloads. CGS’s disaggregation approach revolutionizes the network visibility market with the most modern, scalable, and powerful network packet brokers, resulting in superior network visibility and compelling TCO.

CGS Tower Networks was founded in 2014 and is managed by industry leaders with a track record of success in introducing innovative and superior products and services to the market. Our committed team has vast experience in research and development of networking solutions, overcoming technical challenges and maintaining flexibility and creativity required to meet every customer need.

CGS Tower Networks products were originally designed in a modular and scalable way that leverages industry-leading hardware platforms, for delivering superior performance, reliability, scalability and TCO.

Contact Representative

前往https://ccmsassets.ithome.com.tw/2022/9/22/592b5234-cf7e-4e6d-b41c-047587c6ed74.jpg
Product Type
  • Network Visibility

Products

CGS Network Packet Broker
NEW CGS Network Packet Broker

Traffic is the foundation of all information security and network performance analysis. Any network tool needs to receive the correct traffic in order...

Network Visibility

Solutions

Network Visibility / Networ Pakcet Broker / TAP, Supports 1/10/25/40/100GbE

1. 100% traffic transmission, guarantee no packet loss.

2. Traffic replication, aggregation, distribution, load balancing, filtering, and replication of single-source traffic to multiple tools for analysis.

3. Allocate specific required traffic to specific tool analysis to improve tool analysis efficiency.

4. Whitelist specific traffic to reduce the load of Inline devices and extend the service life.

5. Multi-line sharing inline information security equipment

6. Advanced packet processing, including RegEx, De-Duplication, Replication, Timestamping, Data Masking, GRE Tunneling, ERSPAN Termination

7. Multiple CGS devices can be distributed, managed centrally, and shared resources

8. Tool Service Chain Service Chain"