Your organization faces unprecedented security challenges. The sophistication and volume of attacks increase exponentially, resulting in lost company, personal and customer data, stolen intellectual property, damaged reputations and lost productivity. Security is more complex. You need to clarify what is important when assessing alternatives. With the (bring your own) BYO revolution, the explosion of personal devices connecting to the network, led by smartphones and tablets, slows performance and decreases productivity. Also, mobile applications, such as social media and video streaming, consume an enormous amount of bandwidth. This creates two distinct problems: ensuring security and maintaining productivity. IT managers often compromise security by turning of features to maintain network performance.
Features
NAT
PAT
Firewall Protection Supported
Application Control – Gateway Antivirus – User Authentication – Access Control – Remote Access Authentication – Malware Protection – Deep Inspection Firewall – Web Content Filtering – Anti-spyware – Packet Inspection – Content Filtering – Proxy Blocking – URL Filtering – Anti-spam – Trojan Horse – Stateful Packet Filtering – ICMP Flood – SYNflood Protection – UDP Flood – Denial of Service (DoS) – TCP stream reassembly – Keyword Filtering – Distributed Denial of Service (DDoS) – Zero Day Event – Ingress Filtering – Egress Filtering – Intrusion Prevention – Reassembly-free Deep Packet Inspection