Řešení

Mapa řešení

Firewall

Vyberte si řešení

Funkčnosti a aplikace

  • Juniper Networks - Next generation firewalls perform the following tasks: monitor and control applications used by the employees (P2P, Tor, Gmail, Facebook apps), not only port numbers, verify the employees identity by connecting to Microsoft Active Directory and other authentication systems, act as an intrusion prevention system (IPS) to protect endpoint devices against the attacks from the Internet (e.g. drive-by download attacks), inspect traffic for viruses and intrusion attempts, including traffic encrypted with SSL/TLS.
  • Palo Alto Networks - Next generation firewalls perform the following tasks: monitor and control applications used by the employees (P2P, Tor, Gmail, Facebook apps), not only port numbers, verify the employees identity by connecting to Microsoft Active Directory and other authentication systems, act as an intrusion prevention system (IPS) to protect endpoint devices against the attacks from the Internet (e.g. drive-by download attacks), inspect traffic for viruses and intrusion attempts, including traffic encrypted with SSL/TLS.
  • SonicWall - Pokročilá ochrana před hrozbami, od malých až po globální podniky a cloudová prostředí – zabezpečení sítě bez hranic. SonicWall next-generation firewally (NGFW) poskytují zabezpečení, kontrolu a visibilitu, což přispívá k udržení si efektivní pozice v oblasti kybernetické bezpečnosti. Oceňovaný hardware a vyspělá technologie společnosti SonicWall jsou zabudovány do každého firewallu, aby tak poskytovaly výhodu nad neustále se vyvíjejícími hrozbami. S řešeními navrženými pro sítě všech velikostí jsou firewally SonicWall přizpůsobeny tak, aby splňovaly specifické potřeby zabezpečení a použitelnosti, a to za cenu, která chrání jak váš rozpočet, tak i síť.

Výhody pro organizaci

  • Increasing employees productivity. The firewall allows the employees to access only the Internet services they need to perform their duties.
  • Lowering the risk of criminals taking over the company’s computers. This is possible thanks to limiting the employees access to dangerous applications (P2P, Tor/Deep Web) and protecting endpoint devices against attacks from the Internet (e.g. drive-by download).
  • Identifying and isolating devices taken over by the criminals. The firewall identifies and blocks C&C connections used by criminals to control compromised devices.