Firewall

Organizations have traditionally employed Firewalls/UTMs (Unified Threat Management) as one of their primary defense component. Firewalls/UTMs act as gatekeepers between the Internet and the organizational network, or between different internal organizational networks and systems.

We would appreciate your feedback on our new website!

Please drop us a line

Overview

Firewalls/UTMs’ function is to either block or permit different traffic patterns. This function is based on the access control policy enforced upon them, which in turn is also based on their location and function on the organizational network. When appropriately configured and properly managed on an ongoing basis, Firewalls/UTMs comprise a major part of the organization’s network and systems security infrastructure.

Characteristics

Our Firewall/UTM solutions share the following minimum characteristics:
Optimum Protection
Capability to assign access permissions to network and systems, increasing the protection profile in both physical and virtual systems and network environments within the protected perimeter
Highly Effective
Capability to align Firewall/UTM access rules directly with organizational cybersecurity policy, thus enabling swift and effective deployment of organizational security frameworks
Simplified Management
Incorporated centralized administration ensures across the board changes and reduces management costs
Instrumental Reporting
Capability to generate purpose-built reports useful both for internal audit as well as for legal and regulatory compliance
Deployment Flexibility
The deployment model of the Firewall/UTM solution is designed to fit the organizational needs of the existing environment, as a multi-vendor solution

Features

Deep Packet Inspection
DPI capability ensures that the various pieces of each packet are thoroughly examined, in order to identify malformed packets, errors, known attacks and any other anomalies. DPI can rapidly identify and then block Trojans, viruses, spam, intrusion attempts and any protocol communications violations among others
Central, Powerful Management
Centralized management system aggregates data across organizations’ security defenses and enables security teams to respond quickly. Hence, a centralized system enables organizations to view, deploy and control all Firewall/UTM activity through a single pane of glass
Enterprise level VPN
Powerful Virtual Private Network (VPN) ensures resilient and flexible site-to-site encrypted communication. Firewalls/UTMs can add even more power to VPN by combining IPsec VPN with other advanced technologies, such as those that may combine links or tunnels to produce a cost-effective and highly available VPN connectivity
High Availability/Load Sharing
The Key feature in achieving high availability and resiliency is the use of Firewall/UTM’s active-passive and active-active clustering mechanism. Active-passive and active-active clustering offers uninterrupted operations during system updates and maintenance

Deployment

Drawing from our ever-growing expertise, developed through our Technology Risk Solutions and Managed Security Services (MSS) divisions, we first assess your organization’s needs based on your existing infrastructure, network architecture, applications and systems’ set up. Once we have a well-rounded understanding, we proceed by proposing the best-suited Firewall/UTM solution that fits your environment.

Remaining Secure

Our suite of post-deployment services is designed to offer further enhancements to your network, systems and applications, as follows:

 

Maintenance & Support

Integration with ClearSkiesTM NG SIEM with

Big Data Security Analytics

Full-fledged 24/7 Managed & Security Log monitoring

This solution comprises part of the “Test & Assess’’, ‘’Design & Implement”, ‘’Monitor & Respond’’ and ‘’Consulting’’ phases of our Information Security Continuum (ISC).