­º­¶> ¨¾¬r¦w¥þ³nÅé

>>ÂsÄý©Ò¦³McAfee¨¾¬r¦w¥þ³nÅé

McAfee
McAfee Integrity Monitor

«¬¸¹¡GMcAfee Integrity Monitor


McAfeeMcAfee Integrity Monitor


°Ñ¦Ò°â»ù¡G½Ð¥ß§Y¨Ó¹q ¤O±ô¸ê°T
( »ù®æ¯}Ãa¦æ±¡¡I¨Ó¹q¬¢¸ß)



ServerBank¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºMcAfee - McAfee Integrity Monitor - ¨¾¬r¦w¥þ³nÅé
³Ì¦nªºMcAfee - McAfee Integrity Monitor±ÄÁÊ¿ï¾Ü´N¦b ServerBank!
¶W¦h´Ú¨¾¬r¦w¥þ³nÅé Åwªï±z¨Ó¹q°Q½×±ÄÁʻݨD¡A²{¦b§ó¦³¦h­«Àu´f¤è®×³á
¥»¯¸°Ó«~§¡¸û¦P·~»PºôÁÊ«K©y,¥ø·~ªø´Á±ÄÁÊ ¶q¤j¥t¦³§é¦©³á!  
 ServerBankÂX¤j©Û¶Ò·~°È¦P¤¯¡I

°Ñ¦Ò°â»ù¡G( ¯}Ãa¦æ±¡¼t°Ó¬IÀ£¡I)
¸ß°Ý¥ô¦óMcAfee¬ÛÃö²£«~½Ð¥ß§Y¨Ó¹q
¤O±ô¸ê°T ServerBank ¹q¸Ü:(02)8969-0901
¸ß»ùEmail service@serverbank.com.tw



·|­û»ù>>¯Á¨ú¦¹°Ó«~³ø»ù
¦Û°Ê¦C¦L³ø»ù³æ(¤´¥i¨Ó¹q¸ß°Ý§é¦©´T«×)


ÂsÄý³W®æ¬Ûªñ¤§McAfee²£«~>>
ÂsÄý³W®æ¬Ûªñ¤§¨ä¥L«~µP²£«~>>






¥[ÁÊ ¼Ð·Ç°t³Æ¥H¥~¤§McAfee­ì¼t°t¥ó


¡@

¡@

¡@

Benefits:

  • Avoid repeat scans with real-time file integrity monitoring
    Until now, meeting the file integrity monitoring (FIM) requirements of the PCI DSS has been difficult. Previous tools have merely provided ¡§periodic¡¨ file integrity monitoring, using resource-intensive scans. McAfee Integrity Monitor eliminates this problem with real-time file integrity monitoring, which continuously detects all changes, with a very low impact on resources. Real-time FIM provides greater information about every change, including the user and program used to make the change. It also eliminates the need to perform scan after scan on servers, databases, and network devices. McAfee Integrity Monitor provides this level of monitoring across the broadest set of platforms.
  • Identify transient change violations
    When a file is changed inappropriately, and then changed back, it creates a transient compliance violation. Periodic FIM solutions are unable to detect this violation. Because McAfee Integrity Monitor is continuous, it captures every change, and alerts you if there is a transient violation¡Xeven if that change is subsequently reversed.
  • Capture a rich set of forensic data
    ¡@

    McAfee Integrity Monitor captures details about every change, including the exact time of the change, who was logged into the machine at the time, what processes (like editors) were running, and if the change was made manually or by an authorized program. This enables rapid investigation of change-related issues.

Features:

  • Comprehensive change detection
    Because McAfee Integrity Monitor delivers continuous monitoring, it captures every single change. This is important for sustaining compliance, because it allows you to see where your compliance policies are being challenged, and addresses inappropriate change at the source.
  • Very low overhead operation
    Periodic scans of the entire system can be expensive and resource-intensive because of the performance impact it can have on applications. By contrast, McAfee Integrity Monitor has negligible impact to applications, because the continuous approach to scanning only deals with the changes that are happening in real-time.
  • Network change and configuration monitoring
    McAfee Integrity Monitor allows organizations to establish configuration standards for network devices, and provides the capability to monitor the compliance of the devices in real-time. The software restores devices to known configurations, and provides detailed audit trails by user.  Devices can be manually added, or discovered using simple network management protocol (SNMP).
  • Endorsed by leading qualified security assessors (QSAs), auditors, and other experts
    Deployed in over 100 countries across 5 continents, McAfee¡¦s real-time file integrity monitoring is the preferred solution for meeting PCI and operational control requirements

¡@


McAfee
McAfee Integrity Monitor - ServerBank¸ê°T±ÄÁʺô
McAfee Integrity Monitor
¨¾¬r¦w¥þ³nÅé


¡@
²£«~³W®æ

Supported Operating Systems (OS)

  • Windows NT
  • Windows 2000/2003/2008
  • Windows XP/Vista
  • Windows XPE
  • Windows XP/Vista (64-bit) 
  • Windows 2003/2008 (64-bit)
  • Red Hat EnterpriseLinux 3/4/5
  • CentOS 4/5
  • SUSE Enterprise Linux 9/10
  • Oracle Enterprise Linux 5  
  • Solaris 8/9/10  
  • HP-UX 11.00/11.11/11.23  
  • AIX 5.2/5.3  
  • IBM i5/OS (AS400) V5R3/V5R4/V6R1  
  • IBM 4690 OS V5

Supported Databases

  • Oracle 8i/9i/10g
  • SQL Server 7/2000/2005
  • DB2 8.x/9.x
  • DB2 for iSeries V5R4

¡@

Supported VMware Hypervisors

  • ESX 3.0.x/3i/3.5
  • Virtual Center
  • VMware Server 2.0

¡@

Network Devices

¡@
Vendor Device Type Supported Model/Series
¡@
Cisco IOS Switch All models of Cisco IOS Switches
¡@ IOS Router All models of Cisco IOS Routers
¡@ Firewall All models of Cisco PIX firewalls & FWSM Modules
¡@ IAD All models of Cisco IAD Devices
¡@ Access Points All models of Cisco Aironet Access Points
¡@ CatOS Switch All models of Cisco CatOS Switches
¡@ Access Server All models of Cisco Access Server models
¡@ Content Switch All models of Cisco Content Switches
¡@ ASA All models of Cisco ASA SingleContext & Multiple Context Models
¡@ Voice Gateway Devices All models of Cisco Voice Gateway Devices
¡@ VPN Concentrators All models of Cisco VPN Concentrator Devices
¡@ MDS Switch All models of Cisco MDS Devices

HP Procurve Switch Switches & Menu based 4000M & 8000M models
¡@ Procurve Access Point All models of HP Procurve AccessPoints

Foundry Switch Foundry BigIron & FastIron Edge Switches

3Com Switch All models of 3Com menu based SuperStack switches

Fortinet FortiGate Firewall All models of FortiGate firewalls & FortiMail devices

Juniper Netscreen Firewall All models of Netscreen Firewalls
¡@ J-Series Router All models of Juniper J-Series Routers

Enterasys Switch All models of Enterasys Matrix N Series Switches

ADTRAN LAN Switch All models of ADTRAN LAN Switches

Nortel Passport Switch All models of Nortel Passport 1600 Series, 8600 Series Switches
¡@ BayStack Switch All models of Nortel BayStack Switches
¡@ BayStack Business Policy Switch All models of Nortel BayStack Business Policy 2000 Series

Aruba WiFi Switch All models of Aruba WiFi Switches

Proxim Access Points All models of Proxim Access Points

Extreme Black Diamond Switch All models of Extreme Black Diamond Switches
¡@ Summit Switch All models of Extreme Summit switches running with Extremeware & ExtremewareXOS

Force 10 Switch All models of Force10 E, S & C Series Switches

Netgear Switch Netgear Prosafe Switches

Dell Switch All models of Dell Power Connect Switches

SlimLine Appliance All models of SlimLine devices

DLink Switch DES 3010 , DES 3899 , DXS 3259

Blue Coat Proxy SG All BlueCoat ProxySG devices

Huawei Router All models of Huawei AR Routers

¡@


¡D¥»¤å¥óªº¸ê°T­Y¦³­×§ï¡A®¤¤£¥t¦æ³qª¾¡C
¡D³W®æ©Î³ø»ù­Y¦³»~¡A¥H­ì¼t«¬¿ý©Î¥¿¦¡³ø»ù³æ¬°¥D¡C
¡D¥»ºô¯¸¤º®e©Î¤å¥ó·í¤¤©Ò´£¤Î¤§«~µP¤Î²£«~¦WºÙ©Î¹Ï¤ù§¡¬°¨ä­ì©ÒÄݤ½¥q¤§ª©Åv¡B°Ó¼Ð©Îµù¥U°Ó¼Ð¡C

º¡¤@©w¼Æ¶q©Îª÷ÃBÁÙ¦³¦h´ÚÃØ«~¥i¨Ñ¿ï¾Ü³á! ServerBank¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºMcAfee - McAfee Integrity Monitor - ¨¾¬r¦w¥þ³nÅé ,³Ì¦nªºMcAfee - McAfee Integrity Monitor±ÄÁÊ¿ï¾Ü´N¦b ServerBank!


¥æ©ö¤Î¹B°e«O©T»¡©ú

¥æ©ö¤è¦¡¡G
±z¤£½T©w¥H¤W°Ó«~¬O§_²Å¦X±zªº»Ý¨D?¨SÃö«Y¡A§Ú­Ì·|¬°±z¦V­ì¼t½T»{¡C©Î¬O±z§Æ±æ¼W´î¥H¤W°Ó«~¤§³W®æ¹s²Õ¥ó¡A§Ú­Ì³£¥i¼u©Ê°t¦X±zªº»Ý­n³ø»ù¤Î¥X³f¡C ¦p±z¹ï¥H¤W²£«~³W®æ¥H¤Î»ù®æº¡·N¡A¥i³z¹L¥H¤U¤è¦¡¶i¦æ±ÄÁÊ¡G

1.¹q¸ÜÁpô¡G ½Ðª½±µ¨Ó¹q¡G(02)8969-0901
2.ºô¸ô¸ß»ù¡GÂI¿ï¥»­¶ÁʶR¸ß»ù§Ú­Ì·|¥ß§Y»P±zÁpô!
3.¨Ó¨ç¸ß»ùEmail: service@serverbank.com.tw
¥I´Ú¤è¦¡¡G¦p«È¤á¬°­º¦¸¥æ©ö±Ä²{ª÷¥æ©ö¡C
¶Ç¯u­q³æ¡G ª½±µ±N¥¿¦¡³ø»ù³æñ¦W«á¶Ç¯u¦Ü(02)2253-9016 §Y§¹¦¨­qÁʵ{§Ç¡A§Ú­Ì·|©ó³Ìµu®É¶¡¤º¹q¸Ü½T»{­q³æ¡C
±H°e®É¶¡¡G¨Ì³y¤£¦P¼tµP¥N²z°Ó¦³©Ò¤£¦P¡A¤j¦h¼Æ°Ó«~©ó 7 ­Ó¤u§@¤Ñ¯à°e©è«È¤áºÝ¡A§Ú­Ì¦¬¨ì±z­q³æ®É·|¦P®É¦^Âбz½T©w¥æ´Á¡C
°e³f¤è¦¡¡G(1) ­ì¼t©Î¬O¥N²z°Óª½±µ°t°e (2) ¥ÑServerBank©e°U¦v°t©Î¬O³f¹B¤½¥q°e¹F¡C
°e³f½d³ò¡G­­¥xÆW¥»®q¦a°Ï¡A¹B¶O¥Ñ ServerBank ¬°±z­t¾á¡Aª`·N¡I¦¬¥ó¦a§}½Ð¤Å¬°¶l¬F«H½c¡C
°â«áªA°È¡G­Y²£«~¥»¨­·å²«©Î¹B°e¹Lµ{¾É­P·s«~·å²«¡A¨ì³f7¤é¤º¥i§ó´«·s«~¡C
«O©T¬Fµ¦¡G ¹ê»Ú¥H­ì¼t¤Î¥N²z°Ó¤½§i«O©T±ø¥ó¬°¥D¡A¬d¾\Áʪ«»¡©ú»P«O©TªA°È¡C¡@

¤O±ô¸ê°T ServerBank Inc. ²¤¶

¥Ø«e¤w¸g¬°¶W¹L30000®a¥ø·~´£¨ÑIT¸ê°T¬[ºc©Ò»Ýªº³nµwÅé³]³Æ¡A¦U¦æ·~ª¾¦W«È¤á¦p¡G

»s³y·~¡G¥x¿n¹q¡B¤Í¹F¡BÂE®üºë±K¡B¤O´¹¥b¾ÉÅé¡B¦w±¶­Û¡B¥xÆWªFªÛ¡B¥xÆW­^­¸­â¡B¥¿´Q¡B§¡»¨¡B§»¥¿¡B©MºÓÁp¦X¡BªF¶©¡B«Ø¿³¹q¤l¡B­¸§Q®ú©úùÖ¡B®õª÷Ä_¡B¯«³q¡B¯«¹F¡B°¶³Ð¤O¡B±d¥þ¡B°ê²³¡B±á¬P¥b¾ÉÅé¡B¼s¹F¹q¸£¡B¼s¿o¹q³q¡BÁpµØ®ðÅé¡BÄ_¦¨¤u·~¡B¼s¹B¡B

¥~°Ó¡G ¥xÆWNTT¡B¥xÆW·Nªk¥b¾ÉÅé¡B¥xÆWNEW Balance¡B¥xÆWNEC¡B¥xÆWSONY¡B¥xÆW´I¤h¥þ¸S¡B

ª÷¿Ä¡G°ê®õ¤H¹Ø¡B¤¸¤jÃÒ¨é¡B«n¤s¤H¹Ø¡B°ê®õ¥@µØ¡B¥xÆW¤u·~»È¦æ¡B¥xÆWª÷¿Ä¬ã°V°|¡B¤T°Ó¬ü¨¹¤H¹Ø¡B¤j¸Û«OÀI¡Bªk°ê¤Ú¾¤¤H¹Ø¡B«O¸Û¤H¹Ø¡B°êµØ¤H¹Ø¡B²Î¤@ÃÒ¨é¡B´I¨¹¤H¹Ø¡BµØ«n²£ª««OÀI¡B·s¥ú¤H¹Ø¡B¥xÆW²£·~«OÀI¡B

¬y³q¡G ·s¥ú¤T¶V¡B¤T¹´(·L­·¼s³õ)¡B«H¸q©Ð«Î¡Bªü¨½¤Ú¤Ú¡B

Æ[¥ú¡G ¤¤«H¶º©±¡B¶³®Ô¶º©±¡B¤Ó¥­¬v¡BµØ®õ¡B¤»ºÖ¡B¤Ñ²»´¹µØ¡B¬K¤Ñ°s©±¡B»·¶¯®ü¬v¤½¶é¡B

­¹«~¡G ¥xÆWµÒ°s¡B¤Ñ¤¯¯ù¸­¡B¤¸¯ª¡B¥ú¬u¡B·sªF¶§¡B¦w¤ß­¹«~(¼¯´µº~³ù)¡B®õ¤s¡B®üÅQ¤ý¡B²Î¤@¥ø·~¡B¾ó¤ì±í¡B¯ø´µ¸ª¡B«¢¸ò¹F´µ¦B²N²O¡B

´CÅé¡G ³ü¶Ç´C¡BÁp¦X³ø¡B¥xµø¡BµØµø¡B«D¤Z¹qµø¡B¨È¬w¼s¼½¡B­¸ºÐ¼s¼½¡B­·¼é°Û¤ù¡B®É³ø©P¥Z¡B

±Ð¨|¡G ¥xÆW¤j¾Ç¡B¥æ³q¤j¾Ç¡B²MµØ¤j¾Ç¡B¤j¦P¤j¾Ç¡B¤¤¥¡¤j¾Ç¡B¤¤­ì¤j¾Ç¡B¤¤¿³¤j¾Ç¡B»²¤j¡B°ê»y¹ê¤p¡BÂù¶é°ê¤p¡BµØ¿³¤¤¾Ç¡BªFªù°ê¤p¡B¥x¬ì¤j¡B©ú§Ó¡BªF§d¡BªF®ü¹qºâ¤¤¤ß¡Bªø©°¤j¾Ç¡B«n¨È§Þ³N¾Ç°|¡B¨ÈªF¡B«nªù°ê¤¤¡B¥x®v¤j¡BªFµØ¡B¶§©ú¡B¶³¬ì¤j¡B¦Ë®v¡Bº[«n¤j¾Ç¡B±X¤s¬ì¤j¡B²H¦¿¡B²M¶³¡B³{¥Ò¡B

²Õ´¡G «H«O°òª÷¡B«C³Ð·|¡B¤¤¤p¥ø·~¨ó·|¡BºÞ²z¬ì¾Ç¾Ç·|¡B­ì¦í¥Á±Ú¤å¤Æ±Ð¨|¨ó·|¡B¸êµ¦·|¡B¥xºô¤¤¤ß¡B¶³ªù»R¶°

¬F©²¡G ¤¤¬ã°|¡B¤¤¬ì°|¡B°·«O§½¡B¤Ñ¤å¬ì±ÐÀ]¡B¦Á¤îĵ§½¡BªO¾ô¹A·|¡B¥x¥_¿¤®ø¨¾§½¡B°ê½Ã°|¡B®ü¥ÍÀ]¡B°ê¦w§½¡B

ÂåÀø¡G ¥x¤jÂå°|¡B®¦¥D¤½Âå°|¡B¥_¨Ê¦P¤¯°ó¡B®H¨½°ò·þ±ÐÂå°|¡B¸¯Äõ¯À¥v§J¡Bù¤ó¤jÃļt¡B¥Ã«HÃÄ«~¡B

¹q«H¡G ¤j²³¹q«H¡B¥xÆW©Tºô¡B»·¶Ç¹q«H¡B

¥æ³q¡G ¥x¥_±¶¹B¤½¥q¡BµØ¯è¡B¤­±]±¶¹B¡B¥xÆW´¼¼z¥d¡B

¤½¯q¡G³ßéw¨à¡B¥ì¨l¡B¶§¥ú°òª÷·|¡B»Z¤½­^¡B¿ßÀYÆN

©v±Ð¡G ¤¤¥xÁI¦x¡B°ò·þ±Ð¦æ¹D·|¡B°ò·þ±Ð®û«H·|¡B

­x¤è¡G ªÅ­x¥q¥O³¡¡B°ê¨¾Âå¾Ç°|¡B

 

 


¡@
         ServerBank ¥Ñ¤O±ô¸ê°TªÑ¥÷¦³­­¤½¥q«Ø¸m@
         ·s¥_¥«ªO¾ô°Ï¤å¤Æ¸ô¤@¬q268¸¹3¼Ó
         ¹q¸Ü:
(02)8969-0901
          service@serverbank.com.tw
          www.ServerBank.com.tw
ServerBank¤O±ô­º­¶

¥þ³¡¤ÀÃþ | ¦Cªí | «~µP | ¶i¶¥·j´M | §Þ³N¤ä´©
¡@
¡@
¹q¸Ü(02)8969-0901
¡@
 ¨¾¤õÀð
 ¨¾¬r
 ¬¡°ÊºÊ±±
 ÁͶÕ
 ÁɪùÅK§J
 McAfee
 SOPHOS
 NOD32
 ¥d¤Ú´µ°ò
 Panda
 eTrust
 ¦¿¥Á
 bullguard
 BitDefender
 G DATA
 IP-Scan
 Norman
«P¾P¬¡°Ê



¡@


ServerBank ¤O±ô¸ê°TServerBank¸ê°T±ÄÁʺô > ¨¾¬r¦w¥þ³nÅé


McAfeeMcAfee Integrity Monitor

McAfee Integrity Monitor


¼tµP¡GMcAfee      >>ÂsÄýMcAfee¥þ³¡²£«~
«¬¸¹¡GMcAfee Integrity Monitor



ServerBank¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºMcAfee - McAfee Integrity Monitor - ¨¾¬r¦w¥þ³nÅé ,³Ì¦nªºMcAfee - McAfee Integrity Monitor±ÄÁÊ¿ï¾Ü´N¦b ServerBank!
¶W¦h´Ú¨¾¬r¦w¥þ³nÅé Åwªï±z¨Ó¹q°Q½×±ÄÁʻݨD¡A²{¦b§ó¦³¦h­«Àu´f¤è®×³á
¥»¯¸°Ó«~§¡¸û¦P·~»PºôÁÊ«K©y,¥ø·~ªø´Á±ÄÁÊ ¶q¤j¥t¦³§é¦©³á!  

 

°Ñ¦Ò°â»ù¡G( ¯}Ãa¦æ±¡¼t°Ó¬IÀ£¡I)
¸ß°Ý¥ô¦óMcAfee¬ÛÃö²£«~, ½Ð¥ß§Y¨Ó¹q(02)8969-0901
¤O±ô¸ê°T ServerBank ¸ß»ùEmail: service@serverbank.com.tw



·|­û»ù>>¯Á¨ú¦¹°Ó«~³ø»ù


ÂsÄý³W®æ¬Ûªñ¤§McAfee²£«~>>
ÂsÄý³W®æ¬Ûªñ¤§¨ä¥L«~µP²£«~>>
¦Û°Ê¦C¦L³ø»ù³æ(½Ð¨Ó¹q¸ß°Ý§é¦©­°´T)






ServerBankÂX¤j©Û¶Ò·~°È¦P¤¯¡I
¥[ÁÊ ¼Ð·Ç°t³Æ¥H¥~¤§McAfee­ì¼t°t¥ó


¡@

¡@

¡@

Benefits:

  • Avoid repeat scans with real-time file integrity monitoring
    Until now, meeting the file integrity monitoring (FIM) requirements of the PCI DSS has been difficult. Previous tools have merely provided ¡§periodic¡¨ file integrity monitoring, using resource-intensive scans. McAfee Integrity Monitor eliminates this problem with real-time file integrity monitoring, which continuously detects all changes, with a very low impact on resources. Real-time FIM provides greater information about every change, including the user and program used to make the change. It also eliminates the need to perform scan after scan on servers, databases, and network devices. McAfee Integrity Monitor provides this level of monitoring across the broadest set of platforms.
  • Identify transient change violations
    When a file is changed inappropriately, and then changed back, it creates a transient compliance violation. Periodic FIM solutions are unable to detect this violation. Because McAfee Integrity Monitor is continuous, it captures every change, and alerts you if there is a transient violation¡Xeven if that change is subsequently reversed.
  • Capture a rich set of forensic data
    ¡@

    McAfee Integrity Monitor captures details about every change, including the exact time of the change, who was logged into the machine at the time, what processes (like editors) were running, and if the change was made manually or by an authorized program. This enables rapid investigation of change-related issues.

Features:

  • Comprehensive change detection
    Because McAfee Integrity Monitor delivers continuous monitoring, it captures every single change. This is important for sustaining compliance, because it allows you to see where your compliance policies are being challenged, and addresses inappropriate change at the source.
  • Very low overhead operation
    Periodic scans of the entire system can be expensive and resource-intensive because of the performance impact it can have on applications. By contrast, McAfee Integrity Monitor has negligible impact to applications, because the continuous approach to scanning only deals with the changes that are happening in real-time.
  • Network change and configuration monitoring
    McAfee Integrity Monitor allows organizations to establish configuration standards for network devices, and provides the capability to monitor the compliance of the devices in real-time. The software restores devices to known configurations, and provides detailed audit trails by user.  Devices can be manually added, or discovered using simple network management protocol (SNMP).
  • Endorsed by leading qualified security assessors (QSAs), auditors, and other experts
    Deployed in over 100 countries across 5 continents, McAfee¡¦s real-time file integrity monitoring is the preferred solution for meeting PCI and operational control requirements

¡@


McAfee
McAfee Integrity Monitor - ServerBank¸ê°T±ÄÁʺô
McAfee Integrity Monitor
¨¾¬r¦w¥þ³nÅé


¡@
²£«~³W®æ

Supported Operating Systems (OS)

  • Windows NT
  • Windows 2000/2003/2008
  • Windows XP/Vista
  • Windows XPE
  • Windows XP/Vista (64-bit) 
  • Windows 2003/2008 (64-bit)
  • Red Hat EnterpriseLinux 3/4/5
  • CentOS 4/5
  • SUSE Enterprise Linux 9/10
  • Oracle Enterprise Linux 5  
  • Solaris 8/9/10  
  • HP-UX 11.00/11.11/11.23  
  • AIX 5.2/5.3  
  • IBM i5/OS (AS400) V5R3/V5R4/V6R1  
  • IBM 4690 OS V5

Supported Databases

  • Oracle 8i/9i/10g
  • SQL Server 7/2000/2005
  • DB2 8.x/9.x
  • DB2 for iSeries V5R4

¡@

Supported VMware Hypervisors

  • ESX 3.0.x/3i/3.5
  • Virtual Center
  • VMware Server 2.0

¡@

Network Devices

¡@
Vendor Device Type Supported Model/Series
¡@
Cisco IOS Switch All models of Cisco IOS Switches
¡@ IOS Router All models of Cisco IOS Routers
¡@ Firewall All models of Cisco PIX firewalls & FWSM Modules
¡@ IAD All models of Cisco IAD Devices
¡@ Access Points All models of Cisco Aironet Access Points
¡@ CatOS Switch All models of Cisco CatOS Switches
¡@ Access Server All models of Cisco Access Server models
¡@ Content Switch All models of Cisco Content Switches
¡@ ASA All models of Cisco ASA SingleContext & Multiple Context Models
¡@ Voice Gateway Devices All models of Cisco Voice Gateway Devices
¡@ VPN Concentrators All models of Cisco VPN Concentrator Devices
¡@ MDS Switch All models of Cisco MDS Devices

HP Procurve Switch Switches & Menu based 4000M & 8000M models
¡@ Procurve Access Point All models of HP Procurve AccessPoints

Foundry Switch Foundry BigIron & FastIron Edge Switches

3Com Switch All models of 3Com menu based SuperStack switches

Fortinet FortiGate Firewall All models of FortiGate firewalls & FortiMail devices

Juniper Netscreen Firewall All models of Netscreen Firewalls
¡@ J-Series Router All models of Juniper J-Series Routers

Enterasys Switch All models of Enterasys Matrix N Series Switches

ADTRAN LAN Switch All models of ADTRAN LAN Switches

Nortel Passport Switch All models of Nortel Passport 1600 Series, 8600 Series Switches
¡@ BayStack Switch All models of Nortel BayStack Switches
¡@ BayStack Business Policy Switch All models of Nortel BayStack Business Policy 2000 Series

Aruba WiFi Switch All models of Aruba WiFi Switches

Proxim Access Points All models of Proxim Access Points

Extreme Black Diamond Switch All models of Extreme Black Diamond Switches
¡@ Summit Switch All models of Extreme Summit switches running with Extremeware & ExtremewareXOS

Force 10 Switch All models of Force10 E, S & C Series Switches

Netgear Switch Netgear Prosafe Switches

Dell Switch All models of Dell Power Connect Switches

SlimLine Appliance All models of SlimLine devices

DLink Switch DES 3010 , DES 3899 , DXS 3259

Blue Coat Proxy SG All BlueCoat ProxySG devices

Huawei Router All models of Huawei AR Routers

¡@


¡D¥»¤å¥óªº¸ê°T­Y¦³­×§ï¡A®¤¤£¥t¦æ³qª¾¡C
¡D³W®æ©Î³ø»ù­Y¦³»~¡A¥H­ì¼t«¬¿ý©Î¥¿¦¡³ø»ù³æ¬°¥D¡C
¡D¥»ºô¯¸¤º®e©Î¤å¥ó·í¤¤©Ò´£¤Î¤§«~µP¤Î²£«~¦WºÙ©Î¹Ï¤ù§¡¬°¨ä­ì©ÒÄݤ½¥q¤§ª©Åv¡B°Ó¼Ð©Îµù¥U°Ó¼Ð¡C

º¡¤@©w¼Æ¶q©Îª÷ÃBÁÙ¦³¦h´ÚÃØ«~¥i¨Ñ¿ï¾Ü³á! ServerBank ¤O±ô¸ê°Tµ¹§A³Ì¶W­ÈÀu´fªºMcAfee - McAfee Integrity Monitor - ¨¾¬r¦w¥þ³nÅé ,³Ì¦nªºMcAfee - McAfee Integrity Monitor±ÄÁÊ¿ï¾Ü´N¦b ServerBank!


¥æ©ö¤Î¹B°e«O©T»¡©ú
¥æ©ö¤è¦¡¡G
±z¤£½T©w¥H¤W°Ó«~¬O§_²Å¦X±zªº»Ý¨D?¨SÃö«Y¡A§Ú­Ì·|¬°±z¦V­ì¼t½T»{¡C©Î¬O±z§Æ±æ¼W´î¥H¤W°Ó«~¤§³W®æ¹s²Õ¥ó¡A§Ú­Ì³£¥i¼u©Ê°t¦X±zªº»Ý­n³ø»ù¤Î¥X³f¡C ¦p±z¹ï¥H¤W²£«~³W®æ¥H¤Î»ù®æº¡·N¡A¥i³z¹L¥H¤U¤è¦¡¶i¦æ±ÄÁÊ¡G

1.¹q¸ÜÁpô¡G ½Ðª½±µ¨Ó¹q¡G(02)8969-0901
2.ºô¸ô¸ß»ù¡GÂI¿ï¥»­¶ÁʶR¸ß»ù§Ú­Ì·|¥ß§Y»P±zÁpô!
3.¨Ó¨ç¸ß»ùEmail: service@serverbank.com.tw
¥I´Ú¤è¦¡¡G¦p«È¤á¬°­º¦¸¥æ©ö±Ä²{ª÷¥æ©ö¡C
¶Ç¯u­q³æ¡G ª½±µ±N¥¿¦¡³ø»ù³æñ¦W«á¶Ç¯u¦Ü(02)2253-9016 §Y§¹¦¨­qÁʵ{§Ç¡A§Ú­Ì·|©ó³Ìµu®É¶¡¤º¹q¸Ü½T»{­q³æ¡C
±H°e®É¶¡¡G¨Ì³y¤£¦P¼tµP¥N²z°Ó¦³©Ò¤£¦P¡A¤j¦h¼Æ°Ó«~©ó 7 ­Ó¤u§@¤Ñ¯à°e©è«È¤áºÝ¡A§Ú­Ì¦¬¨ì±z­q³æ®É·|¦P®É¦^Âбz½T©w¥æ´Á¡C
°e³f¤è¦¡¡G(1) ­ì¼t©Î¬O¥N²z°Óª½±µ°t°e (2) ¥ÑServerBank©e°U¦v°t©Î¬O³f¹B¤½¥q°e¹F¡C
°e³f½d³ò¡G­­¥xÆW¥»®q¦a°Ï¡A¹B¶O¥Ñ ServerBank ¬°±z­t¾á¡Aª`·N¡I¦¬¥ó¦a§}½Ð¤Å¬°¶l¬F«H½c¡C
°â«áªA°È¡G­Y²£«~¥»¨­·å²«©Î¹B°e¹Lµ{¾É­P·s«~·å²«¡A¨ì³f7¤é¤º¥i§ó´«·s«~¡C
«O©T¬Fµ¦¡G ¹ê»Ú¥H­ì¼t¤Î¥N²z°Ó¤½§i«O©T±ø¥ó¬°¥D¡A¬d¾\Áʪ«»¡©ú»P«O©TªA°È¡C

¤O±ô¸ê°T ServerBank Inc. ²¤¶

¥Ø«e¤w¸g¬°¶W¹L30000®a¥ø·~´£¨ÑIT¸ê°T¬[ºc©Ò»Ýªº³nµwÅé³]³Æ¡A¦U¦æ·~ª¾¦W«È¤á¦p¡G

»s³y·~¡G¥x¿n¹q¡B¤Í¹F¡BÂE®üºë±K¡B¤O´¹¥b¾ÉÅé¡B¦w±¶­Û¡B¥xÆWªFªÛ¡B¥xÆW­^­¸­â¡B¥¿´Q¡B§¡»¨¡B§»¥¿¡B©MºÓÁp¦X¡BªF¶©¡B«Ø¿³¹q¤l¡B­¸§Q®ú©úùÖ¡B®õª÷Ä_¡B¯«³q¡B¯«¹F¡B°¶³Ð¤O¡B±d¥þ¡B°ê²³¡B±á¬P¥b¾ÉÅé¡B¼s¹F¹q¸£¡B¼s¿o¹q³q¡BÁpµØ®ðÅé¡BÄ_¦¨¤u·~¡B¼s¹B¡B

¥~°Ó¡G ¥xÆWNTT¡B¥xÆW·Nªk¥b¾ÉÅé¡B¥xÆWNEW Balance¡B¥xÆWNEC¡B¥xÆWSONY¡B¥xÆW´I¤h¥þ¸S¡B

ª÷¿Ä¡G°ê®õ¤H¹Ø¡B¤¸¤jÃÒ¨é¡B«n¤s¤H¹Ø¡B°ê®õ¥@µØ¡B¥xÆW¤u·~»È¦æ¡B¥xÆWª÷¿Ä¬ã°V°|¡B¤T°Ó¬ü¨¹¤H¹Ø¡B¤j¸Û«OÀI¡Bªk°ê¤Ú¾¤¤H¹Ø¡B«O¸Û¤H¹Ø¡B°êµØ¤H¹Ø¡B²Î¤@ÃÒ¨é¡B´I¨¹¤H¹Ø¡BµØ«n²£ª««OÀI¡B·s¥ú¤H¹Ø¡B¥xÆW²£·~«OÀI¡B

¬y³q¡G ·s¥ú¤T¶V¡B¤T¹´(·L­·¼s³õ)¡B«H¸q©Ð«Î¡Bªü¨½¤Ú¤Ú¡B

Æ[¥ú¡G ¤¤«H¶º©±¡B¶³®Ô¶º©±¡B¤Ó¥­¬v¡BµØ®õ¡B¤»ºÖ¡B¤Ñ²»´¹µØ¡B¬K¤Ñ°s©±¡B»·¶¯®ü¬v¤½¶é¡B

­¹«~¡G ¥xÆWµÒ°s¡B¤Ñ¤¯¯ù¸­¡B¤¸¯ª¡B¥ú¬u¡B·sªF¶§¡B¦w¤ß­¹«~(¼¯´µº~³ù)¡B®õ¤s¡B®üÅQ¤ý¡B²Î¤@¥ø·~¡B¾ó¤ì±í¡B¯ø´µ¸ª¡B«¢¸ò¹F´µ¦B²N²O¡B

´CÅé¡G ³ü¶Ç´C¡BÁp¦X³ø¡B¥xµø¡BµØµø¡B«D¤Z¹qµø¡B¨È¬w¼s¼½¡B­¸ºÐ¼s¼½¡B­·¼é°Û¤ù¡B®É³ø©P¥Z¡B

±Ð¨|¡G ¥xÆW¤j¾Ç¡B¥æ³q¤j¾Ç¡B²MµØ¤j¾Ç¡B¤j¦P¤j¾Ç¡B¤¤¥¡¤j¾Ç¡B¤¤­ì¤j¾Ç¡B¤¤¿³¤j¾Ç¡B»²¤j¡B°ê»y¹ê¤p¡BÂù¶é°ê¤p¡BµØ¿³¤¤¾Ç¡BªFªù°ê¤p¡B¥x¬ì¤j¡B©ú§Ó¡BªF§d¡BªF®ü¹qºâ¤¤¤ß¡Bªø©°¤j¾Ç¡B«n¨È§Þ³N¾Ç°|¡B¨ÈªF¡B«nªù°ê¤¤¡B¥x®v¤j¡BªFµØ¡B¶§©ú¡B¶³¬ì¤j¡B¦Ë®v¡Bº[«n¤j¾Ç¡B±X¤s¬ì¤j¡B²H¦¿¡B²M¶³¡B³{¥Ò¡B

²Õ´¡G «H«O°òª÷¡B«C³Ð·|¡B¤¤¤p¥ø·~¨ó·|¡BºÞ²z¬ì¾Ç¾Ç·|¡B­ì¦í¥Á±Ú¤å¤Æ±Ð¨|¨ó·|¡B¸êµ¦·|¡B¥xºô¤¤¤ß¡B¶³ªù»R¶°

¬F©²¡G ¤¤¬ã°|¡B¤¤¬ì°|¡B°·«O§½¡B¤Ñ¤å¬ì±ÐÀ]¡B¦Á¤îĵ§½¡BªO¾ô¹A·|¡B¥x¥_¿¤®ø¨¾§½¡B°ê½Ã°|¡B®ü¥ÍÀ]¡B°ê¦w§½¡B

ÂåÀø¡G ¥x¤jÂå°|¡B®¦¥D¤½Âå°|¡B¥_¨Ê¦P¤¯°ó¡B®H¨½°ò·þ±ÐÂå°|¡B¸¯Äõ¯À¥v§J¡Bù¤ó¤jÃļt¡B¥Ã«HÃÄ«~¡B

¹q«H¡G ¤j²³¹q«H¡B¥xÆW©Tºô¡B»·¶Ç¹q«H¡B

¥æ³q¡G ¥x¥_±¶¹B¤½¥q¡BµØ¯è¡B¤­±]±¶¹B¡B¥xÆW´¼¼z¥d¡B

¤½¯q¡G³ßéw¨à¡B¥ì¨l¡B¶§¥ú°òª÷·|¡B»Z¤½­^¡B¿ßÀYÆN

©v±Ð¡G ¤¤¥xÁI¦x¡B°ò·þ±Ð¦æ¹D·|¡B°ò·þ±Ð®û«H·|¡B

­x¤è¡G ªÅ­x¥q¥O³¡¡B°ê¨¾Âå¾Ç°|¡B


¡@
¡@

ServerBank¥Ñ¤O±ô¸ê°TªÑ¥÷¦³­­¤½¥q«Ø¸m service@serverbank.com.tw
¹q¸Ü(02)8969-0901 ¶Ç¯u(02)2253-9016 ·s¥_¥«ªO¾ô°Ï¤å¤Æ¸ô¤@¬q268¸¹3¼Ó

¡@
¡@