R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Size: px
Start display at page:

Download "R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services"

Transcription

1 Secure Communications Product Brochure R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

2 R&S SITGate Next-Generation Firewall At a glance The R&S SITGate is a multifunctional, nextgeneration firewall that uses the latest technology for analyzing data traffic at very high speed. The firewall blocks hazardous or unauthorized use and warns of attacks and abuse. The R&S SITGate is a next-generation firewall featuring advanced single-pass technology. The innovative deep packet inspection of incoming and outgoing network traffic protects against current and future threats, without neglecting rising performance requirements. This is made possible by running the decoded data stream through a series of security checks that are bundled on multiple levels. Current IT threats are not only highly complex they change practically every day. The emergence of layer-7 malware and rapidly transforming threats render most conventional network security solutions useless. It is no longer possible to protect networks effectively with conventional IP and port-based firewalls. Simple intrusion prevention systems can no longer keep pace with the technical development of evasive malware, which is sometimes hidden deep within legitimate layer-7 applications. Today's business processes require a variety of applications that often have to communicate with business sites and mobile users that are very far away. Modern Web 2.0 applications increase customer proximity and the productivity of many companies, but also provide attack vectors for malware. Among other things, this can interfere with staff productivity. Key facts Next-generation firewall with deep packet inspection, intrusion prevention and malware protection Context-based protocol analysis for uncovering threats posed by botnets, Web 2.0 applications and zero-day attacks Complete TCP re-assembly even detects hidden attacks on encrypted connections Powerful VPN concentrator for secure connection of external sites and mobile users Seamless integration in Active Directory and LDAP makes it possible to create user-specific rules R&S SITGate L500. R&S SITGate M Series. 2

3 R&S SITGate Next-Generation Firewall Benefits and key features Maximum security despite growing threats More secure than stateful firewall and more effective than unified threat management Comprehensive application detection and continuous protocol validation, even for encrypted connections Powerful malware protection Intrusion prevention system (IPS) with daily updates page 4 Simple implementation of security guidelines in existing infrastructures Seamless integration into Active Directory and LDAP directories Precise application of organizational guidelines for stringent Internet access Secure integration of remote locations, mobile users and cloud services page 5 Advanced single-pass technology made in Germany Content-based and context-specific screening of each connection Decoding of all major application protocols Data leakage prevention IT security made in Germany page 6 R&S SITGate S Series. Abbreviations AV IP IPS HTTPS Gbit/s LDAP Mbit/s SSL TCP TLS UDP UTM VPN Antivirus Internet protocol Intrusion prevention system Hypertext transport protocol secure Gigabit per second Lightweight directory access protocol Megabit per second Secure sockets layer Transmission control protocol Transport layer security User datagram protocol Unified threat management Virtual private network Rohde & Schwarz R&S SITGate Next-Generation Firewall 3

4 Maximum security despite growing threats More secure than stateful firewall and more effective than unified threat management The idea of the next-generation firewall incorporates all UTM technologies to create a unified and consistent screening method on all levels. This minimizes the danger of conflicting configurations and unknown threats. The various compatible screening methods simplify administrative tasks and increase network throughput. Comprehensive application detection and continuous protocol validation, even for encrypted connections The application detection feature implemented in the R&S SITGate analyzes network traffic and detects hundreds of network applications with the greatest possible accuracy and maximum throughput rate. Even applications such as BitTorrent and Skype, which communicate via encrypted connections, are detected and can be allowed or blocked. The various communications protocols undergo constant validation. Connections showing protocol violations are blocked immediately. The R&S SITGate is therefore also able to protect against potential attacks that exploit zero-day security gaps. Powerful malware protection Downloaded documents and files are constantly screened for malware using protection based on Bitdefender antimalware technology. The screening is already performed in the data stream, so there are no file size restrictions. Intrusion prevention system (IPS) with daily updates The R&S SITGate currently has a database containing over 9000 decoder-based IPS signatures that are updated on a daily basis. The R&S SITGate protects against current and future threats. 4

5 Simple implementation of security guidelines in existing infrastructures Seamless integration into Active Directory and LDAP directories External and internal users are identified by their IP addresses. For the sake of simplicity, security guidelines can be implemented by specifying user names or groups, since the R&S SITGate accesses internal directories such as Active Directory or other LDAP-compatible directory services. Precise application of organizational guidelines for stringent Internet access The web filter integrated in the R&S SITGate contains millions of well-known and categorized websites. Access to these sites is controlled by the user name or group membership. The R&S SITGate provides a port-based and IP-based stateful firewall, which is complemented by comprehensive application detection. This allows security guidelines to be implemented in a highly detailed way for each user or group. (Example: Marketing department may view but not post to Twitter. ) Whitelisting and blacklisting are also supported. Secure integration of remote locations, mobile users and cloud services The R&S SITGate terminates incoming VPN connections. The resulting data traffic is treated as a separate security zone, which allows other security guidelines to be applied. Secure TLS/SSL connections such as HTTPS can be analyzed even though they are encrypted. This exposes potential threats or even unauthorized data leaks that exploit encrypted connections. Security guidelines can be adapted for specific applications in a highly granular fashion. R&S SITGate reporting feature. Rohde & Schwarz R&S SITGate Next-Generation Firewall 5

6 Advanced singlepass technology made in Germany Content-based and context-specific screening of each connection The R&S SITGate is built with future-oriented singlepass technology that runs network traffic through several security checks which screen both the content and the context of the connection. Single-pass technology has been implemented in the R&S SITGate with a high degree of parallelism. The maximum configuration can process several million connections simultaneously. Data leakage prevention The R&S SITGate provides maximum protection against unwanted data leaks because it is able to block the entire flow of network traffic and connections originating from unknown activities. IT security made in Germany For more than 20 years, the name Rohde & Schwarz SIT GmbH has been synonymous with encryption and IT security. The company is the security partner of the Federal Republic of Germany and provides its customers around the world with innovative solutions for protecting their information and telecommunications equipment. Decoding of all major application protocols Single-pass technology uses the most advanced deep packet inspection method, which detects hundreds of applications and can decode a great variety of different protocols. The connection can be examined closely for all important applications. Traffic is screened rigorously for malware and undesirable content. The protocol decoders make it possible to forgo complex sets of rules and excessive use of regular expressions. This results in better performance and greater transparency for administrative tasks. False positives and false negatives are minimized. Single-pass checks data traffic on various levels in near realtime speed Web filter Data flow 6

7 Specifications in brief Specifications in brief R&S SITGate S series M series L series Dimensions (W H D) S100 M200 M400 L500 L mm 44 mm 320 mm (1 HU) (16.8 in 1.7 in 12.6 in) 430 mm 44 mm 437 mm (1 HU) (17.0 in 1.7 in 17.2 in) 430 mm 80 mm 548 mm (2 HU) (17.0 in 3.1 in 21.6 in) Ethernet ports 6 1 Gigabit Ethernet 9 1 Gigabit Ethernet 9 1 Gigabit Ethernet 16 1 Gigabit Ethernet 12 1 Gigabit Ethernet, 2 10 Gigabit Ethernet For local management configurable configurable and WAN/uplink Recommended users up to to to to to Firewall throughput 1) 180 Mbit/s 1.5 Gbit/s 3 Gbit/s 6 Gbit/s 8 Gbit/s UTM throughput 2) 150 Mbit/s 500 Mbit/s 1 Gbit/s 2 Gbit/s 3 Gbit/s VPN throughput 30 Mbit/s 100 Mbit/s Mbit/s 600 Mbit/s Simultaneous connections New connections /s /s /s /s /s VPN users Zones Management intuitive, easy-to-use web browser configuration (AJAX), wizards for quick startup; adaptable widgets simplify individual administrative tasks 1) Large UDP packets, firewall only. 2) Real traffic (benchmark), IPS, AV, web filter enabled. Ordering information Designation Type Order No. S Series Base unit, 6 1 Gigabit Ethernet R&S SITGate S100 Base Unit Full protection one year R&S SITGate S100 FP1Y Full protection three years R&S SITGate S100 FP3Y M Series Base unit, 9 1 Gigabit Ethernet R&S SITGate M200 Base Unit Full protection one year R&S SITGate M200 FP1Y Full protection three years R&S SITGate M200 FP3Y Base unit, 9 1 Gigabit Ethernet R&S SITGate M400 Base Unit Full protection one year R&S SITGate M400 FP1Y Full protection three years R&S SITGate M400 FP3Y L Series Base unit, 16 1 Gigabit Ethernet R&S SITGate L500 Base Unit Full protection one year R&S SITGate L500 FP1Y Full protection three years R&S SITGate L500 FP3Y Base unit, 12 1, 2 10 Gigabit Ethernet R&S SITGate L800 Base Unit Full protection one year R&S SITGate L800 FP1Y Full protection three years R&S SITGate L800 FP3Y Rohde & Schwarz R&S SITGate Next-Generation Firewall 7

8 Service you can rely on J Worldwide J Local and personalized J Customized and flexible J Uncompromising quality J Long-term dependability About Rohde & Schwarz Rohde & Schwarz is an independent group of companies specializing in electronics. It is a leading supplier of solutions in the fields of test and measurement, broadcasting, radiomonitoring and radiolocation, as well as secure communications. Established more than 75 years ago, Rohde & Schwarz has a global presence and a dedicated service network in over 70 countries. Company headquarters are in Munich, Germany. Environmental commitment Energy-efficient products Continuous improvement in environmental sustainability Certified Quality System ISO 9001 Rohde & Schwarz SIT GmbH Am Studio 3 D Berlin Phone Fax info.sit@rohde-schwarz.com Rohde & Schwarz GmbH & Co. KG Regional contact Europe, Africa, Middle East customersupport@rohde-schwarz.com North America TEST RSA ( ) customer.support@rsa.rohde-schwarz.com Latin America customersupport.la@rohde-schwarz.com Asia/Pacific customersupport.asia@rohde-schwarz.com China / customersupport.china@rohde-schwarz.com R&S is a registered trademark of Rohde & Schwarz GmbH & Co. KG Trade names are trademarks of the owners Printed in Germany (ch) PD Version August 2012 R&S SITGate Data without tolerance limits is not binding Subject to change 2012 Rohde & Schwarz GmbH & Co. KG München, Germany

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE

More information

R&S IP-GATE IP gateway for ISDN encryption devices

R&S IP-GATE IP gateway for ISDN encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for ISDN encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the most recent models of the R&S MKS9680 and

More information

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission Secure Communications Product Brochure 01.01 R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission R&S MKS9680 Modular Encryption Device At a glance The R&S MKS9680 is a highly

More information

Realtime FFT processing in Rohde & Schwarz receivers

Realtime FFT processing in Rohde & Schwarz receivers Realtime FFT in Rohde & Schwarz receivers Radiomonitoring & Radiolocation Application Brochure 01.00 Realtime FFT in Rohde & Schwarz receivers Introduction This application brochure describes the sophisticated

More information

Apple ipad Remote Control for Broadcasting T&M Instruments Application Note

Apple ipad Remote Control for Broadcasting T&M Instruments Application Note Apple ipad Remote Control for Broadcasting T&M Instruments Marius Schipper 10.2012-7BM82_1E Apple ipad Remote Control for Broadcasting T&M Instruments Application Note Products: R&S DVMS1 / DVMS4 R&S DVSG

More information

R&S AVG050 DVB Satellite Receiver Compact DVB-S and DVB-S2 satellite demodulator

R&S AVG050 DVB Satellite Receiver Compact DVB-S and DVB-S2 satellite demodulator AVG050-SAT_bro_en_3606-8508-12_v0200.indd 1 Product Brochure 02.00 Broadcast & Media R&S AVG050 DVB Satellite Receiver Compact DVB-S and DVB-S2 satellite 08.09.2015 13:23:25 R&S AVG050 DVB Satellite Receiver

More information

Rohde & Schwarz Service that adds value

Rohde & Schwarz Service that adds value Rohde & Schwarz Service that adds value Rohde & Schwarz Extended Warranty We want to help you control your costs. And that s why we freeze them for years. The Extended Warranty offers cost control while

More information

R&S BC NETSTATE Open network management software for broadcast applications

R&S BC NETSTATE Open network management software for broadcast applications R&S BC NETSTATE Open network management software for broadcast applications Broadcasting Product Brochure 01.00 R&S BC-NETSTATE At a glance R&S BC NETSTATE is a specialized software solution for broadcast

More information

R&S Analysis Center Automatic radio network detection and situation picture visualization

R&S Analysis Center Automatic radio network detection and situation picture visualization Radiomonitoring & Radiolocation Data Sheet 01.00 R&S Analysis Center Automatic radio network detection and situation picture visualization R&S Analysis Center At a glance R&S Analysis Center was developed

More information

R&S FS-K130PC Distortion Analysis Software Amplifier modeling and linearization

R&S FS-K130PC Distortion Analysis Software Amplifier modeling and linearization FS-K130_bro_en_5214-4113-12.indd 1 Product Brochure 03.00 Test & Measurement R&S FS-K130PC Distortion Analysis Software Amplifier modeling and linearization 02.10.2014 12:26:18 R&S FS-K130PC Distortion

More information

R&S ENY81-CA6 Coupling Network For radio disturbance and immunity measurements

R&S ENY81-CA6 Coupling Network For radio disturbance and immunity measurements R&S ENY81-CA6 Coupling Network For radio disturbance and immunity measurements on telecommunications ports Test & Measurement Data Sheet 01.00 R&S ENY81-CA6 Coupling Network At a glance The R&S ENY81-CA6

More information

R&S RNMS3000 Radio Network Management System Utilization planning, radio network configuration and data distribution

R&S RNMS3000 Radio Network Management System Utilization planning, radio network configuration and data distribution RNMS3000_bro_en_5213-9640-12_v0200.indd 1 Product Brochure 02.00 Secure Communications R&S RNMS3000 Radio Network Management System Utilization planning, radio network configuration and data distribution

More information

R&S RCMS II Remote Control & Monitoring System For ATC and air defense applications

R&S RCMS II Remote Control & Monitoring System For ATC and air defense applications RCMSII_bro_en_5213-6464-12.indd 1 Product Brochure 09.00 Secure Communications Remote Control & Monitoring System For ATC and air defense applications 26.05.2014 13:12:01 Remote Control & Monitoring System

More information

R&S EFL110/ R&S EFL210 Cable TV Analyzer and Leakage Detector Detecting interference in cable TV and LTE networks

R&S EFL110/ R&S EFL210 Cable TV Analyzer and Leakage Detector Detecting interference in cable TV and LTE networks R&S EFL110/ R&S EFL210 Cable TV Analyzer and Leakage Detector Detecting interference in cable TV and LTE networks Broadcasting Product Brochure 01.00 R&S EFL110/ R&S EFL210 Cable TV Analyzer and Leakage

More information

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID URLS THREATS DATA Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and

More information

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network. Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration

More information

R&S R-Line Compact Test Chamber Precise measurements of radiated emissions of wireless terminals 800 MHz to 18 GHz

R&S R-Line Compact Test Chamber Precise measurements of radiated emissions of wireless terminals 800 MHz to 18 GHz Test & Measurement Data Sheet 02.00 R&S R-Line Compact Test Chamber Precise measurements of radiated emissions of wireless terminals 800 MHz to 18 GHz R&S R-Line Compact Test Chamber At a glance The R-Line

More information

R&S SMZ Frequency Multiplier Specifications

R&S SMZ Frequency Multiplier Specifications Test & Measurement Data Sheet 02.00 R&S SMZ Frequency Multiplier Specifications CONTENTS Definitions... 3 Specifications... 4 RF performance...4 Frequency...4 Level...4 Spectral purity...4 Connectors...5

More information

R&S RTO Digital Oscilloscope Resolving Security Issues When Working in Secure Areas

R&S RTO Digital Oscilloscope Resolving Security Issues When Working in Secure Areas Digital Oscilloscope Resolving Security Issues When Working in Secure Areas Based upon the user s security requirements, this document describes the Rohde&Schwarz options available to address the user

More information

Production testing of radar sensors for automotive applications

Production testing of radar sensors for automotive applications Production testing of radar sensors for automotive applications Innovative, cost-efficient solution for component and functional test Test & Measurement Application Brochure 01.00 Production testing of

More information

Making Spectrum Measurements with Rohde & Schwarz Network Analyzers

Making Spectrum Measurements with Rohde & Schwarz Network Analyzers Making Spectrum Measurements with Rohde & Schwarz Network Analyzers Application Note Products: R&S ZVA R&S ZVB R&S ZVT R&S ZNB This application note describes how to configure a Rohde & Schwarz Network

More information

Remote Monitoring and Control of the R&S RTO with a Web Browser Application Note

Remote Monitoring and Control of the R&S RTO with a Web Browser Application Note Remote Monitoring and Control of the R&S RTO with a Web Browser Application Note Products: R&S RTO1012 R&S RTO1014 R&S RTO1022 R&S RTO1024 This application note describes remote operation or monitoring

More information

Firewall Testing Methodology W H I T E P A P E R

Firewall Testing Methodology W H I T E P A P E R Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Network Security Solution. Arktos Lam

Network Security Solution. Arktos Lam Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security

More information

R&S ZNC Vector Network Analyzer Solid performance on a future-oriented platform

R&S ZNC Vector Network Analyzer Solid performance on a future-oriented platform Test & Measurement Product Brochure 01.00 R&S ZNC Vector Network Analyzer Solid performance on a future-oriented platform R&S ZNC Vector Network Analyzer At a glance High reliability, outstanding ease

More information

USG6600 Next-Generation Firewall

USG6600 Next-Generation Firewall USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Applications erode the secure network How can malware be stopped?

Applications erode the secure network How can malware be stopped? Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent

More information

USG6300 Next-Generation Firewall

USG6300 Next-Generation Firewall USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The

More information

R&S VISA Release Notes Software Version 5.5.4

R&S VISA Release Notes Software Version 5.5.4 R&S VISA Release Notes Software Version 5.5.4 2015 Rohde & Schwarz GmbH & Co. KG Muehldorfstr. 15, 81671 Munich, Germany Phone: +49 89 41 29-0 Fax: +49 89 41 29 12-164 E-mail: mailto:info@rohde-schwarz.com

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

Malware Protection II White Paper Windows 7

Malware Protection II White Paper Windows 7 Malware Protection II White Paper Windows 7 Rohde & Schwarz recognizes the potential risk of computer virus infection when connecting Windows -based test instrumentation to other computers via local area

More information

R&S ZCxxx Millimeter-Wave Converters Specifications

R&S ZCxxx Millimeter-Wave Converters Specifications ZCxxx_dat-sw_en_3607-1471-22_v0200_cover.indd 1 Data Sheet 02.00 Test & Measurement R&S ZCxxx Millimeter-Wave Converters Specifications 21.07.2015 15:09:16 CONTENTS Definitions... 3 General information...

More information

SERVICE DESCRIPTION Web Proxy

SERVICE DESCRIPTION Web Proxy SERVICE DESCRIPTION Web Proxy Date: 14.12.2015 Document: Service description: Web Proxy TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6 2.2.1 Web Filter

More information

R&S SLx8000 Family of UHF/VHF Transmitters Efficient solutions for analog and digital broadcasting standards

R&S SLx8000 Family of UHF/VHF Transmitters Efficient solutions for analog and digital broadcasting standards Broadcasting Product Brochure 04.00 R&S SLx8000 Family of UHF/VHF Transmitters Efficient solutions for analog and digital broadcasting standards R&S SLx8000 Family of UHF/VHF Transmitters At a glance The

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

R&S RA CHM System Status Monitoring For maximum system availability

R&S RA CHM System Status Monitoring For maximum system availability A-CHM_bro_en_3607-0975-12_v0300.indd 1 Product Brochure 03.00 adiomonitoring & adiolocation &S A CHM System Status Monitoring For maximum system availability 09.07.2015 10:52:38 &S A CHM System Status

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

R&S CMWrun Sequencer Software Tool Applications

R&S CMWrun Sequencer Software Tool Applications Sequencer Software Tool Applications CMWrun_app-bro_en_3606-8243-91_v0200.indd 1 Sequencer Software Tool Test & Measurement Application Brochure 02.00 Ready-to-use solution for configuring test sequences

More information

Nominee: Barracuda Networks

Nominee: Barracuda Networks Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network

More information

NEWS. Offprint from News 201. Europe s air traffic control on the way to voice over IP

NEWS. Offprint from News 201. Europe s air traffic control on the way to voice over IP NEWS Offprint from News 201 Europe s air traffic control on the way to voice over IP Europe s air traffic control on the way to voice over IP Voice communications systems will continue to be absolutely

More information

R&S SMZ Frequency Multiplier Precise output levels from 50 GHz to 170 GHz

R&S SMZ Frequency Multiplier Precise output levels from 50 GHz to 170 GHz SMZ_bro_en_5214-4336-12_v0200.indd 1 Product Brochure 02.00 Test & Measurement R&S SMZ Frequency Multiplier Precise output levels from 50 GHz to 170 GHz 24.09.2013 09:46:58 R&S SMZ Frequency Multiplier

More information

R&S ZNC Vector Network Analyzer Specifications

R&S ZNC Vector Network Analyzer Specifications ZNC3_dat-sw_en_5214-5610-22_v0300_cover.indd 1 Data Sheet 03.00 Test & Measurement R&S ZNC Vector Network Analyzer Specifications 04.09.2012 13:39:47 CONTENTS Definitions... 3 Measurement range... 4 Measurement

More information

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

R&S ZNBT8 Vector Network Analyzer Specifications

R&S ZNBT8 Vector Network Analyzer Specifications ZNBT8_dat-sw_en_3606-9727-22_v0200_cover.indd 1 Data Sheet 02.00 Test & Measurement R&S ZNBT8 Vector Network Analyzer Specifications 20.05.2014 08:39:42 CONTENTS Definitions... 3 Measurement range... 4

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Using R&S NRP-Z Power Sensors with Android TM Handheld Devices. Application Note. Products:

Using R&S NRP-Z Power Sensors with Android TM Handheld Devices. Application Note. Products: Application Note, P. Diestelhorst, P. Geltinger 8.2013-1MA215_3e Using R&S NRP-Z Power Sensors with Android TM Handheld Devices Products: Application Note R&S NRP-Z This application note describes how

More information

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls Fast Facts In 2012, 9 billion devices were connected to the Internet, and 50 billion are projected to be connected by 2020. Global data center traffic is expected to quadruple over the next five years,

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

Spectral and Time-Domain Analysis of Recorded Wave Files on the Audio Analyzer R&S UPV Application Note

Spectral and Time-Domain Analysis of Recorded Wave Files on the Audio Analyzer R&S UPV Application Note 1GA66 Thomas Lechner, 1GPM 19.Aug.2014-0e Spectral and Time-Domain Analysis of Recorded Wave Files on the Audio Analyzer R&S UPV Application Note Products: R&S UPV R&S UPV-B2 R&S UPV-K61 R&S UPV-K63 The

More information

R&S Postman III Radiocommunications system for stateof-the-art. data transmission. Product Brochure 01.02. Secure Communications

R&S Postman III Radiocommunications system for stateof-the-art. data transmission. Product Brochure 01.02. Secure Communications R&S Postman III Radiocommunications system for stateof-the-art IP based data transmission Secure Communications Product Brochure 01.02 R&S Postman III At a glance Civil and military missions require that

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

ELCRODAT 5-4 Highly secure voice and data communications in digital and analog networks

ELCRODAT 5-4 Highly secure voice and data communications in digital and analog networks Highly secure voice and data communications in digital and analog networks Secure Communications Data Sheet 02.02 At a glance The (ED5-4) is used by military organizations and government authorities for

More information

Unified Threat Management Throughput Performance

Unified Threat Management Throughput Performance Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did

More information

Malware Protection White Paper

Malware Protection White Paper Malware Protection White Paper Rohde & Schwarz recognizes the potential risk of computer virus infection when connecting Windows -based test instrumentation to other computers via local area networks (LANs),

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

R&S FS-K130PC Distortion Analysis Software Specifications

R&S FS-K130PC Distortion Analysis Software Specifications FS-K130PC_dat-sw_en_5214-4113-22_cover.indd 1 Data Sheet 02.00 Test & Measurement R&S FS-K130PC Distortion Analysis Software Specifications 03.03.2014 10:46:15 CONTENTS Specifications... 3 Recommended

More information

R&S UMS12-OEM Monitoring System Modular monitoring system with open programming interface

R&S UMS12-OEM Monitoring System Modular monitoring system with open programming interface R&S UMS12 Monitoring System Modular monitoring system with open programming interface Radiomonitoring & Radiolocation Data Sheet 01.00 R&S UMS12 Monitoring System At a glance The R&S UMS12 is a new member

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

Next-Generation Firewall Overview

Next-Generation Firewall Overview Next-Generation Firewall Overview Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are accessing any application,

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Inspection of Encrypted HTTPS Traffic

Inspection of Encrypted HTTPS Traffic Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents

More information

Remote Control of ROMES on Windows 7. Application Note

Remote Control of ROMES on Windows 7. Application Note Remote Control of ROMES on Windows 7 Application Note 1SP15 Products: R&S ROMES R&S TSMW R&S TSMW-Z3 R&S TSMx. Application Note Michael Manert 05.2011-1SP15_0E Table of Contents Table of Contents 1 Introduction...

More information

R&S AEM100 ATSC-M/H Emission Multiplexer Compact solution for ATSC Mobile DTV

R&S AEM100 ATSC-M/H Emission Multiplexer Compact solution for ATSC Mobile DTV Broadcasting Product Brochure 02.00 R&S AEM100 ATSC-M/H Emission Multiplexer Compact solution for ATSC Mobile DTV R&S AEM100 ATSC-M/H Emission Multiplexer At a glance The R&S AEM100 ATSC-M/H emission multiplexer

More information

Network protection and UTM Buyers Guide

Network protection and UTM Buyers Guide Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

NSFOCUS Web Application Firewall White Paper

NSFOCUS Web Application Firewall White Paper White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Moving Beyond Proxies

Moving Beyond Proxies Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security

More information

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial

More information

IBM Security Network Protection

IBM Security Network Protection IBM Software Data sheet IBM Security Network Protection Highlights Delivers superior zero-day threat protection and security intelligence powered by IBM X- Force Provides critical insight and visibility

More information

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware DATA SHEET ZSCALER WEB SECURITY CLOUD FOR SMALL BUSINESS OVERVIEW In today s competitive world, Small and Medium Businesses (SMB) are focusing their discretionary resources on growing revenue and increasing

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

CGHub Client Security Guide Documentation

CGHub Client Security Guide Documentation CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................

More information

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.

More information

Executive Brief on Enterprise Next-Generation Firewalls

Executive Brief on Enterprise Next-Generation Firewalls Executive Brief on Enterprise Next-Generation Firewalls How security technology can reduce costs, improve compliance and increase employee productivity Enterprise Next-Generation Firewalls protect businesses

More information

Rohde & Schwarz Cybersecurity Product overview

Rohde & Schwarz Cybersecurity Product overview Rohde & Schwarz Cybersecurity Product overview Cybersecurity Secure networks Tap-proof communications Endpoint security and trusted management Network analysis Rohde & Schwarz Cybersecurity Rohde & Schwarz

More information

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet Huawei Technologies Co., Ltd. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or

More information

Next-Generation Firewall Overview

Next-Generation Firewall Overview Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Cisco ASA 5500 Series Business Edition

Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

McAfee Network Security Platform A uniquely intelligent approach to network security

McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform A uniquely intelligent approach to network security Key Advantages Unparalleled threat prevention Next-generation architecture. Advanced botnet and malware callback detection.

More information

Lip-Sync Measurement (AV Delay) for TV Displays Application Note

Lip-Sync Measurement (AV Delay) for TV Displays Application Note Lip-Sync Measurement (AV Delay) for TV Displays Application Note Products: R&S DVSG Hameg HMO3524 This application note describes the measurement of AV delay on TVs and monitors. Determining the delay

More information

Intrusion Defense Firewall

Intrusion Defense Firewall Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

Using Palo Alto Networks to Protect the Datacenter

Using Palo Alto Networks to Protect the Datacenter Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular

More information