We are a leading cybersecurity & solution provider In australia



NETWORK


Enterprise Firewall

New opportunities of the "Continent" 4th generation

OUR HOLISTIC APPROACH TO NETWORK SECURITY IS THE ANSWER


KEY FEATURES

Security Through Visibility


Powerful DPI engine allows you to Identify more than 2600 applications Including Instant messaging, social media, file sharing and enterprise applications. Allow the ones you need and block the rest.

AI-Based Attack Protection


Signature-less Intrusion detection system allows you to catch adversaries inside your network. Evasion resistant technology constantly monitors network and highlights suspicious activity.

Advanced Encryption Technologies


Highly sophisticated network encryption technologies provide secure connectivity between HQ and branches. FPGA based encryption module provides up to 20 Gigabits per second low latency encryption performance.

USE CASES


DISTRIBUTED NETWORK PERIMETER PROTECTION

Approach

Centralized management :

  • Device settings
  • Firewall Policy
  • VPN settings
  • IPS policy

Granular Identity based policy :

  • LDAP integration
  • Captive portal

Flexible web- monitoring interface

Application control engine (2600 applications)

Malicious URL blocking

Network behavior anomaly detection

NAT support

Dynamic routing

Results

  • Cost-effective network protection
  • Optimized network security management and monitoring
  • Proactive threat protection

INTERNAL NETWORK SEGMENTATION

Approach

Automated ‘Waterfall’ to binary tree rule translation

High packet-per-second rate

Intel DPDK framework implementation

NAT support

Routing support

Results

  • Cost-effective network protection
  • Reduced risks of horizontal hacker propagation
  • Ultra-high performance
  • Performance doesn’t depend on rule base size

INTRUSION DETECTION AND PREVENTION

Approach

lexible signature profile settings :

  • Layer 3 IPS (included in UTM)
  • Layer 2 IPS

Granular IPS profile enforcement

Network behavior anomaly detection :

  • Signature-less protection
  • Zero performance impact

Open signature base

Performance impact optimized signatures

Results

  • Sophisticated threats detection
  • Advanced targeted attacks detection
  • All-in-one protection against internet threats
  • Protection doesn’t affect network topology

MODEL RANGE

For Demo Please Mail Us!