Virtual Security Gateway Serie

Size: px
Start display at page:

Download "Virtual Security Gateway Serie"

Transcription

1 Produktinformationen Virtual Security Gateway Serie Haben Sie Fragen oder wünschen eine Beratung, eine kostenlose Teststellung oder weitere Informationen? Tel.: Mobil: XNC GmbH Auf der Kaiserbitz 3 D Köln Amtsgericht Köln HRB Geschäftsführer Frank Bergknecht

2 Clavister Virtual Security Gateway Series Product Sheet Protect Virtual Servers Runs within the Virtual Environments Secure Inter-Communication Achieve Auditing and Regulatory Compliance No Security Policy Compromises for Virtual Environments Highly Scalable Lower CAPEX Simplified Administration and Maintenance Green IT Highly Resource Optimized Optimized for the Unique Conditions found only in Virtual Environments Introducing Clavister Virtual Security Gateway More and more organizations are focusing on virtualization and reaping the benefits of cost reduction, higher utilization of hardware, less power consumption and an optimized environment, not to mentioned benefits such as ease of deployment and improved service availability. But there is one thing that does not come for free with virtualization and that is security. Virtualization puts new and demanding requirements on security, and therefore requires a virtualized security solution especially designed for virtual environments Clavister is proud to introduce a leading virtual security solution for Data Centers/Hosting Providers, Telecom Operators and leading organizations. The Clavister Virtual Security Gateway Series joins the rank of the award-winning Clavister Security Gateway Series offering the same powerful Unified Treat Management (UTM) services as its hardware appliance sibling. However, the main difference is that the Clavister Virtual Security Gateway Series runs inside the virtual environment as an integrated part and can therefore be managed as any other virtualized applications. Security in virtualized environments must be easy to configure, maintain and deploy and requires special considerations regarding resource utilization and cater for the exceptional dynamic nature of virtualized environments where virtual machines are routinely moved around. This is especially true for Managed Security Service Providers (MSSP) and Data Centers who need an effective way to provision new services to customers. Virtualization Market The virtualization market has experience a strong growth rate in the last couple of years. Yankee Group stated in August 2007 that 9 of 10 enterprises have virtualization by 2007 and Gartner predicted in April 2008 that virtualization would be part of nearly every aspect of IT by This scenario shows a clear trend; more and more organizations move to virtualized environments. This creates new and challenging security threats in the virtualized environment that needs to be addressed. So far, the virtualization market has focused its effort on deployment, maintenance and provisioning of virtual servers. With the introduction of Clavister Virtual Security Gateway, network security professionals now have the right solution to provision security in a virtual environment, without sacrificing any functionality. we are network security

3 Management Options Clavister offers you a wide range of management options to manage your Clavister Virtual Security Gateway Series. Regardless if you choose a centralized management solution or use the built-in web-based management solution, all Clavister Security Gateways Series products and services are managed in the same way. Clavister InControl Clavister InControl offers a comprehensive centralized management solution that will assist and help you perform daily tasks faster, easier and more streamlined. Its intuitive user interface and support for task-driven workflow management will guide you through complex and repetitive tasks, thus alleviating the burden of managing large installations. Challenges in Virtualized Network Security Traditional network security relies on physical segmentation of networks and servers, where physical firewalls or security gateways form effective filters between different servers and applications. In a virtual environment, however, a large amount of servers may be deployed within the boundaries of a virtual infrastructure. As a result, communication between servers does not necessarily need to leave the virtual infrastructure and pass through the external physical security systems. Using traditional, non-virtualized security solutions in conjunction with a virtualized environment in many ways defeats the benefits with virtualization, such as cost-savings and ease of administration. It is clear that organizations need to adopt a virtualized security solution especially designed for virtual infrastructures, especially since the virtual environment is a very dynamic environment, where servers are added, removed and change place frequently. This means that the traditional security solution cannot offer the same level of security as security solutions which operate within the virtual environment. Clavister Web Management Clavister Web Management is an easy to use Web-based administration interface, which greatly simplifies product deployment. Command-Line Interface All Clavister Security Gateway Series products also support a comprehensive command-line interface. It is a powerful tool for anyone who wants to build custom administration interfaces. This new release allows us to add state-of-the-art virtual security appliance offerings to our product portfolio. Kurt Glazemakers, VP Engineering European Business Unit, Terremark Worldwide, Inc. Virtualization, as with any emerging technology, will be the target of new security threats. Neil MacDonald, Vice President and Gartner Fellow Clavister offers one of the most compelling virtual security solutions for virtualized environments. Jorina van Rensburg, CEO Condyn, South Africa Security in virtualized environments must be easy to configure, maintain and deploy and requires special considerations regarding resource utilization. Given the dynamic nature of the virtualized environment, where virtualized applications can be restarted and moved, it is mandatory that the virtualized security solution operates within the virtualized environment. This is also a requirement for enabling protection between virtualized servers. Without securing the inter-communication between virtualized applications, it is not possible to achieve regulatory compliance, which is often a requirement for many solutions. This is especially true for Managed Security Service Providers (MSSP) and Data Centers who need an effective way to provision new services to customers. Clavister, as a VMware Technology Alliance Partner, has worked hard to ensure that the Clavister Virtual Security Gateway Series is uniquely positioned as being very efficient on resource utilization and easy to manage in a virtual environment. Resource Management Virtualization is about managing your resources more efficiently. Dedicated servers may not utilize all its resource the most optimal way, whereas it is possible to consolidate many servers in a virtual environment and get the best possible resource utilization. The requirement for a virtual network security product must therefore be very efficient and require a minimum of resource, such as small footprint and memory requirement without sacrificing the level of security provided. Copyright Clavister AB. All rights reserved.

4 Clavister Security Gateway Clavister Virtual Security Gateway Series comes with all the features of the Clavister Security Gateway Series, including: Stateful Firewall Supports both IPv4 and IPv6 Deep Packet Inspection IPsec and SSL VPN Intrusion Detection & Prevention (IDP) Web Content Filtering Anti-Virus Anti-Spam SIP/VoIP Support Virtualization Technologies Gigabit Traffic Management User Authentication Server Load Balancing Route Load Balancing High Availability Clustering For more information about Clavister Security Gateway, please visit: Clavister Virtual Security Gateway - Resource Efficient Clavister Virtual Security Gateway requires just 64 Megabyte of RAM and less than 32 Megabyte of hard disk space, which makes it one of the most efficient virtual network security products on the market and the ideal choice for Data Centers and Managed Security Service Providers (MSSP) who wish to provide security services to hundreds or thousands of customers. Green IT The promise of a greener IT environment and a huge reduction in energy cost can be achieved with right-sizing your IT environment and dynamic management of computer capacity across a pool of servers. Energy costs saving by 80 percent is not uncommon in virtualized environments. This makes the Clavister Virtual Security the obvious choice for customers who want to save energy and the environment. VMware Technology Alliance Partner Clavister is a VMware Technology Alliance Partner and we are working closely with VMware to ensure the highest possible technology match for Clavister Virtual Security Gateway. Clavister Virtual Security Gateway The new Clavister Virtual Security Gateway Series requires Clavister CorePlus 9.10 or higher and VMware ESXi 3 or higher. "Clavister was the sole Security Gateway provider flexible enough to deal with our diverse IT environment. Furthermore, they met our extremely high reliability standards." Uwe Fischer, CIO E.ON C&R Features and Benefits Protect Virtual Servers. You can easily separate virtual machines from each other to eliminate the possibility of an intruder gaining easy access to several machines. Secure Inter-Communication. Utilize VPN encryption to secure communication between virtual machines. Achieve Auditing and Regulatory Compliance. Since the Clavister Virtual Security Gateway is inside the virtual environment, security auditing can be achieved and thereby meeting regulatory compliance requirements. No Security Policy Compromises for Virtual Environments. Share your standard set of policies among your hardware appliances and virtual appliances. This makes it much easier to enforce a cohesive security policy across all your Clavister network security gateways. Scalability. Administrators can now extend security by simply deploying new Clavister Virtual Security Gateways as they go. This could be done simply by drag-and-drop or scripted using the built-in Command-Line Interface (CLI). Lower CAPEX. Virtualization enables new business models where CAPEX is minimized. Simplified Administration and Maintenance. Security components inherit all manageability features from the virtual environment, such as fail-over, provisioning, etc. This gives the solution a much easier administration and maintenance. Minimized Downtime. Less hardware combined with highly efficient disaster recovery and redundancy tools, such as VMmotion from VMware, reduces downtime and improves the overall service performance of the security solution. Copyright Clavister AB. All rights reserved.

5 Clavister Virtual Security Gateway Series Specifications Performance Clavister VSG Clavister VSG Pro Firewall Performance (Mbps)* 1,000 10,000 VPN Performance (Mbps)* 1,000 4,000 Concurrent Connections* 64,000 1,000,000 Concurrent VPN Tunnels (SSL/IPsec)* 500/500 2,000/2,000 Ethernet Interfaces Up to 3 Up to 10 Virtual Interfaces (VLAN) Virtual Routers Form Factor Supported Virtual Platform Features Mode of operations Routing Application Layer Gateways User Authentication Firewall High Availability Virtual Private Network (IPsec) IPv6 Support IP Address Assignment Log Monitoring Traffic Management Intrusion Detection and Prevention Virtual VMware ESXi Layer 2 Mode (Transparent/Route Mode) Policy-Based NAT/PAT Policy-Based Server Load Balancing Virtual IP Static Routing/Source-Based Routing Policy-Based Routing (PBR) OSPF/OSPF over VPN Multicast IGMP GRE FTP/TFTP SIP/H.323 with NAT/SAT Support HTTP SMTP/POP3 LDAP Authentication (Multiple) External RADIUS Database servers RADIUS Accounting CHAP PAP Web-Based Authentication Configurable HTTP/HTTPS Front-End xauth VPN Authentication MAC Address Authentication Stateful Firewall Deep Packet Inspection Network Attack Detection/Prevention DoS and DDoS Detection/Prevention TCP Reassembly Firewall and VPN State Synchronization Device Failure Detection Dead Link Gateway and Interface Detection Route/Interface Failover Average Failover Time (< 800 ms) Encryption (AES, 3DES, DES, Blowfish, CAST-128) Authentication (SHA-1, MD5) IKE Modes (Main, Aggressive) Perfect Forward Secrecy/DH Groups (1, 2, 5) X.509 Certificates Pre-Shared Keys Self-Signed Certificates IPsec NAT Traversal (NAT-T) IPsec Tunnel Keep-Alive L2TP Client L2TP Server (LNS) PPTP Client PPTP Server (PNS) VPN Policy Selection Through (Firewall Rule Set, Routing, PBR) Ethernet and VLAN interfaces (Static IPv6 Address Assignment) IP Rules (ALLOW, DROP and REJECT) Neighbor Discovery IPv6 Routing/Policy-Based Routing ICMPv6 Static DHCP Client (Server & Relay) Proxy ARP PPPoE Syslog Support Log Export (CSV) 1 Real-Time Performance Monitoring SNMP Policy-Based Bandwidth Management Guaranteed Maximum Bandwidth Dynamic Bandwidth Balancing Priority Levels Stateful Pattern Matching Protocol/Rate Anomaly Insertion/Evasion Protection Dynamic IP Blacklisting Automatic Signature Updates Stateful Signatures Component-Based Signatures Application Blocking Security Management Clavister InControl Support 1 Clavister Web Management Local Console (RS232/SSH) Command-Line Remote Management Remote Fail-Safe Operations Virtual Private Network (TLS/SSL VPN) Content Security Warranty One-Time Client Installation Browser Independent VPN Policy Selection Through Firewall Rule Set Routing PBR Web Content Filtering - Audit/Blocking Mode Classification Categories (32) URL Whitelisting/Blacklisting Anti-Virus - Stream-Based Signatures Automated Signature Updates Per Devices Signature Service Anti-Spam - DNS Blacklisting The Clavister VSG Series come with ninety (90) days Software maintenance covering all major and minor software releases counting from the earlier date of Product registration or ninety (90) days following shipment. * Specification is hardware (host) dependent. NOTE: Within the virtual environment, Clavister VSG does not put any restriction on performance. The performance numbers given reflects the performance at interface level only. About Clavister For over a decade, Clavister has been delivering leading network security solutions, providing commercial advantage to businesses worldwide. The Clavister family of Carrier Telecom Security Systems, unified threat management (UTM) appliances and remote access solutions provide innovative and flexible network security with world-class management and control. Clavister is a recognized pioneer in virtualization and cloud security. This compliments its portfolio of hardware appliances delivering customers the ultimate choice of network security products. Clavister products are backed by Clavister s award-winning support, maintenance and training program. To learn more, visit Where to buy? Sales Offices CID: clavister-dts-clavister-vsg-series (2011/11) we are network security Clavister AB, Sjögatan 6 J, SE Örnsköldsvik, Sweden Phone: +46 (0) Fax: +46 (0) Web: Copyright Clavister AB. All rights reserved. The Clavister logo and all Clavister product names and slogans are trademarks or registered trademarks of Clavister AB. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies. Information in this document is subject to change without prior notification.

Security Gateway 10er Serie

Security Gateway 10er Serie Produktinformationen Security Gateway 10er Serie Haben Sie Fragen oder wünschen eine Beratung, eine kostenlose Teststellung oder weitere Informationen? kh.hoeschen@xnc.com Tel.: 02203 96960 Mobil: 0174-9222144

More information

Secure Access Gateway 3000er Serie

Secure Access Gateway 3000er Serie Produktinformationen Secure Access Gateway 3000er Serie Haben Sie Fragen oder wünschen eine Beratung, eine kostenlose Teststellung oder weitere Informationen? kh.hoeschen@xnc.com Tel.: 02203 96960 Mobil:

More information

Misconceptions surrounding security in a virtualized environment

Misconceptions surrounding security in a virtualized environment Misconceptions surrounding security in a virtualized environment Clavister White Paper ization is a boom technology, and it is imperative that this environment is secure as any other part of the network.

More information

Network Security Firewall

Network Security Firewall DFL-210 Multi-Function Security + Network Firewall + VPN Server + Content Manager + Bandwidth Manager + Transparent Firewall Mode Ports + 1 Ethernet WAN + 4 Ethernet LAN + 1 Ethernet DMZ/WAN2 Advanced

More information

Clavister Virtual. VirtualSeries. Feature-rich next-generation firewall with excellent performance, perfect for the Cloud.

Clavister Virtual. VirtualSeries. Feature-rich next-generation firewall with excellent performance, perfect for the Cloud. clavister VirtualSeries Clavister Virtual Feature-rich next-generation firewall with excellent performance, perfect for the Cloud FEATURES AT-A-GLANCE Cost-effective next-generation virtual firewall for

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

Unified Services Routers

Unified Services Routers High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20

More information

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive

More information

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy

More information

Unified Services Routers

Unified Services Routers High VPN Performance Protocols IPSec PPTP LTP SSL Up to 5 (DSR-500/500N) or 70 (DSR-1000/1000N) VPN tunnels Up to 10 (DSR-500/500N) or 0 (DSR-1000/1000N) SSL VPN tunnels DES, DES, AES Encryption Main/

More information

DOWNTIME CAN SPELL DISASTER

DOWNTIME CAN SPELL DISASTER DOWNTIME CAN SPELL DISASTER Technical Brief Ensure Network Uptime: High Availability with XTM FireCluster August 2010 Network downtime is expensive for businesses in today s 24/7 global economy. Any malfunctions

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

Clavister E5. EagleSeries. Feature-rich, entry-level next-generation firewall in a slim form factor. clavister. Next-Generation Firewall Services

Clavister E5. EagleSeries. Feature-rich, entry-level next-generation firewall in a slim form factor. clavister. Next-Generation Firewall Services clavister EagleSeries Clavister E5 Feature-rich, entry-level next-generation firewall in a slim form factor FEATURES AT-A-GLANCE Cost-effective next-generation firewall for any organization, housed in

More information

Clavister Virtual Core

Clavister Virtual Core clavister VirtualSeries Clavister Virtual Core Feature-rich next-generation firewall with excellent performance, perfect for the Cloud FEATURES AT-A-GLANCE Cost-effective next-generation virtual firewall

More information

Clavister W3. WolfSeries. Next-generation firewall with excellent scalability, performance and functionality. clavister

Clavister W3. WolfSeries. Next-generation firewall with excellent scalability, performance and functionality. clavister clavister WolfSeries Clavister W3 Next-generation firewall with excellent scalability, performance and functionality FEATURES AT-A-GLANCE Cost-effective next-generation firewall for larger remote/branch

More information

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks Stonesoft 5.5 Firewall/VPN Reference Guide Firewall Virtual Private Networks Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway PLANET Product Guide 2011 Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router Gigabit Multi-Homing VPN Security Router Physical Port 1~2 x 10/100/1000 Base-T RJ-45, configurable with LAN 1 (Mirror Port) 3~4 x 10/100/1000 Base-T RJ-45, configurable with WAN 4 (WAN 4 / LAN2 / DMZ)

More information

Unified Services Routers

Unified Services Routers Product Highlights Cost effective multifunction network solution ideal for small businesses High speed router with integrated VPN tunnel support for secure network access from a remote location Policybased

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Network Security. Protective and Dependable. Pioneer of IP Innovation

Network Security. Protective and Dependable. Pioneer of IP Innovation Network Protective and Dependable Pioneer of IP Innovation Why PLANET Network Solution? With the growth of the threats, network security becomes the fundamental concerns of home and enterprise network.

More information

Clavister W5. WolfSeries. High performance next-generation firewall with excellent scalability and functionality. clavister

Clavister W5. WolfSeries. High performance next-generation firewall with excellent scalability and functionality. clavister clavister WolfSeries Clavister W5 High performance next-generation firewall with excellent scalability and functionality FEATURES AT-A-GLANCE Cost-effective next-generation firewall for main headquarters,

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication Feature Brief Policy-Based Server Load Balancing March 2007 Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

More information

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based

More information

WATCHGUARD FIREBOX VCLASS

WATCHGUARD FIREBOX VCLASS FIREBOX VCLASS WATCHGUARD FIREBOX VCLASS ENTERPRISE-LEVEL SECURITY The Firebox Vclass brings high-speed network security to enterprise-class businesses, remote offices, service providers, and data centers.

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN Tagging and Port-Based VLAN D-Link End-to-End

More information

F IREWALL/VPN REFERENCE GUIDE

F IREWALL/VPN REFERENCE GUIDE STONEGATE 5.3 F IREWALL/VPN REFERENCE GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

Virtualization 101 A basic guide to virtualization for the small to medium business

Virtualization 101 A basic guide to virtualization for the small to medium business ization 101 A basic guide to virtualization for the small to medium business White Paper s five-point guide to adopting virtualization Redefine the security policy to include the virtualization aspect

More information

Clavister X8. LynxSeries. Rugged and durable next-generation firewall, with outstanding performance and scalability. clavister

Clavister X8. LynxSeries. Rugged and durable next-generation firewall, with outstanding performance and scalability. clavister clavister LynxSeries Clavister X8 Rugged and durable next-generation firewall, with outstanding performance and scalability FEATURES AT-A-GLANCE Cost-effective next-generation firewall for harsh environments,

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks:

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks: HiPER 840 4-WAN Broadband Gateway/Router Overview HiPER 840 4-WAN Broadband Gateway/Router is a purpose-built solution designed for small-sized Internet cafés, broadband communities and schools which require

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN Tagging D-Link End-to-End Security Solution

More information

Wireless Controller DWC-1000

Wireless Controller DWC-1000 Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection

More information

Introduction of Quidway SecPath 1000 Security Gateway

Introduction of Quidway SecPath 1000 Security Gateway Introduction of Quidway SecPath 1000 Security Gateway Quidway SecPath 1000 security gateway is new generation security equipment developed specially for enterprise customer by Huawei-3Com. It can help

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Cisco RV180 VPN Router

Cisco RV180 VPN Router Data Sheet Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet

More information

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,

More information

Clavister W20. WolfSeries. Next-generation firewall with excellent scalability, performance and functionality. clavister

Clavister W20. WolfSeries. Next-generation firewall with excellent scalability, performance and functionality. clavister clavister WolfSeries Clavister W20 Next-generation firewall with excellent scalability, performance and functionality FEATURES AT-A-GLANCE Cost-effective next-generation firewall for larger remote/branch

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine featuring an intuitive redesigned Web GUI Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN

More information

Clavister E80. EagleSeries. Feature-rich, entry-level next-generation firewall in a slim form factor. clavister. Next-Generation Firewall Services

Clavister E80. EagleSeries. Feature-rich, entry-level next-generation firewall in a slim form factor. clavister. Next-Generation Firewall Services clavister EagleSeries Clavister E80 Feature-rich, entry-level next-generation firewall in a slim form factor FEATURES AT-A-GLANCE Cost-effective next-generation firewall for any organization, housed in

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,

More information

SonicWALL Advantages Over WatchGuard

SonicWALL Advantages Over WatchGuard Competitive Analysis August 2001 WatchGuard SOHO - Product Overview WatchGuard Technologies extended its product offerings to the fast-growing broadband market through the acquisition of BeadleNet, LLC,

More information

Cisco RV215W Wireless-N VPN Router

Cisco RV215W Wireless-N VPN Router Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides

More information

Endian UTM Virtual Appliance

Endian UTM Virtual Appliance Security with Passion Endian UTM Virtual Appliance Endian UTM Virtual Appliance Prebuilt VMware appliance for ESX or ESXi Support for both Xen and Citrix XenServer Support for RedHat KVM hypervisor Endian

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series Product Highlights Increased Security Integrated Firewall/VPN and UTM provides protection from viruses, intrusions and harmful content. Reduced Cost of Ownership Subscription service per firewall rather

More information

LB Intelligent Multi-WAN Router

LB Intelligent Multi-WAN Router LB Intelligent Multi-WAN Router Increases WAN reliability and availability Increases Internet Bandwidth Improves availability and response time for external requests to hosted servers Supports VPN resiliency

More information

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Cyberoam Next-Generation Security. 11 de Setembro de 2015 Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...

More information

Clavister Virtual Stream

Clavister Virtual Stream clavister VirtualSeries Clavister Virtual Stream Powerful firewall with massive performance, perfect for virtualized telecom networks FEATURES AT-A-GLANCE The perfect solution for modern Telecom solutions

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance This article will easily explain how to configure your Apple ipad, iphone or ipod Touch

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Stonesoft 5.4. Firewall Reference Guide. Firewall Virtual Private Networks

Stonesoft 5.4. Firewall Reference Guide. Firewall Virtual Private Networks Stonesoft 5.4 Firewall Reference Guide Firewall Virtual Private Networks Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3 High Availability FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook High Availability v3 2 May 2014 01-431-99686-20140502 Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate,

More information

Public Internet Access Done the Right Way

Public Internet Access Done the Right Way Public Internet Access Done the Right Way Supports 500 concurrent logins by default and up to 800 via license upgrade Integrated account generator, Web-based authentication portal and billing system Supports

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Gigabit Multi-Homing VPN Security Gateway

Gigabit Multi-Homing VPN Security Gateway Gigabit Multi-Homing VPN Security Gateway Key Features Physical Port 5 x 0/00/000BASE-T RJ-45, Undefined Ethernet port (WAN / LAN / DMZ). Multi-WAN function Outbound load balancing (Supported algorithms:

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

Cradlepoint COR IBR350 Specifications

Cradlepoint COR IBR350 Specifications Cradlepoint COR IBR350 Specifications Figure 1: COR IBR350 Highly Available, Cloud-Managed M2M Gateway The Cradlepoint COR IBR350 Series is a compact, LTE-only or HSPA+ networking solution designed for

More information

Simplify Your Network Security with All-In-One Unified Threat Management

Simplify Your Network Security with All-In-One Unified Threat Management Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Network Security Firewall Manual Building Networks for People

Network Security Firewall Manual Building Networks for People D-Link DFL-700 TM Network Security Firewall Manual Building Networks for People (20031225) Contents Introduction...6 Features and Benefits... 6 Introduction to Firewalls... 6 Introduction to Local Area

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

Forcepoint Stonesoft Management Center

Forcepoint Stonesoft Management Center Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Firewall Feature Overview

Firewall Feature Overview Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises

More information

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch

20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated

More information

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management EdgeRouter Lite 3-Port Router Model: ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced 3-Port Router Introducing the EdgeRouter

More information

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide. http://www.peplink.com - 1 - Copyright 2015 Peplink

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide. http://www.peplink.com - 1 - Copyright 2015 Peplink Peplink Balance http://www.peplink.com - 1 - Copyright 2015 Peplink Introduction Introduction Understanding Peplink VPN solutions Peplink's VPN is a complete, seamless system that tightly integrates your

More information

McAfee NGFW Reference Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role

McAfee NGFW Reference Guide for Firewall/VPN Role 5.7. NGFW Engine in the Firewall/VPN Role McAfee NGFW Reference Guide for Firewall/VPN Role 5.7 NGFW Engine in the Firewall/VPN Role Legal Information The use of the products described in these materials is subject to the then current end-user

More information

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

F IREWALL/VPN REFERENCE GUIDE

F IREWALL/VPN REFERENCE GUIDE STONEGATE 5.2 F IREWALL/VPN REFERENCE GUIDE F IREWALL V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

MANAGED SHAREPOINT SOLUTIONS

MANAGED SHAREPOINT SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED SHAREPOINT SOLUTIONS Private SharePoint 2013 SharePoint 2013 with Office apps NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents

More information

DrayTek Vigor 2950. High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports

DrayTek Vigor 2950. High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports DrayTek Vigor 2950 Â High Performance Firewall Router VPN Up to 200 concurrent tunnels Load Balancing & Failover between WAN ports DoS/DDos Protection & Stateful Packet Inspection QoS (Quality of Service)

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Clavister InSight TM. Protecting Values

Clavister InSight TM. Protecting Values Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide

More information

Vyatta Network OS for Network Virtualization

Vyatta Network OS for Network Virtualization Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information