Solutions 2017-03-25T19:37:00+00:00

DATA CENTER FIREWALLS

Effective protection is an absolute necessity in today’s rapidly growing threat environment, as is having a fast, reliable network. You can’t afford to choose between comprehensive security and network performance, and with our solutions, you don’t have to. 

A next gen firewall is a high-performance network security appliance that adds intrusion prevention, application and user visibility, SSL inspection, and unknown threat detection to the traditional firewall.  NGFW appliance protects the edge of the campus and internal segments using high end performance combined with security intelligence to:

  • Enforce security policies with granular control and visibility of users and devices for thousands of discrete applications
  • Identify and stop threats with powerful intrusion prevention beyond port and protocol that examines the actual content of your network traffic
  • Perform high-performance SSL inspection using industry-mandated ciphers
  • Proactively detect malicious unknown code using our cloud-based sandbox service
  • Provide you with real-time views into network activity with actionable application and risk dashboards and reports
  • Deliver superior, multi-function performance by running on purpose-built appliances with custom ASICs

ENTERPRISE IDS/IPS

Get better protection against today’s sophisticated attacks. Stop more threats, gain more insight into your environment, and protect your digital business initiatives. Next-Generation IPS (NGIPS) threat appliances combine superior visibility, embedded security intelligence, automated analysis, and industry-leading threat effectiveness. 

NGIPS features and benefits:

Real-time contextual awareness: If you can’t see it, you can’t protect it. Gain deep insight into your network devices, applications, users, operating systems, files, and more. Use this information to better understand network behavior, identify out-of-compliance situations, and evaluate intrusion events.

Advanced threat protection: Address known and unknown threats through fully integrated advanced malware protection (AMP) and sandboxing solutions. Rapidly detect, block, contain, and remediate advanced threats. Our median time to detection (MTTD) is an industry-leading 13 hours.

Global threat intelligence: Get up-to-the-minute threat protection through our partners worldwide threat visibility and analysis organization. Their efforts result in more than 35,000 vulnerability-focused IPS rules, advanced malware detections, and embedded IP-based, URL-based, and DNS-based security intelligence.

Intelligent security automation: Correlate threat events with the intended target’s vulnerabilities to prioritize the threats that matter most. Analyze your network vulnerabilities to identify needed security policies. Associate users with our intrusion events to speed investigations. Do more with less staff.

High-performance appliances: The appliances are purpose-built to provide the right throughput, modular design, and carrier-class scalability. They incorporate a low-latency, single-pass design and include fail-to-wire interfaces.

ENTERPRISE MESSAGING SECURITY

An email security gateway manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable.

Protect Against Email-Borne Threats: With the Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages.

Stop Threats before They Hit the Network: Offload CPU-intensive tasks like antivirus and DDoS filtering to the cloud reduces the processing load on the appliance and to ensure that threats never reach the network perimeter. The Email Security Gateway is integrated with a cloud-based service that pre-filters email before delivery to the onsite Email Security Gateway, which performs further inbound security checks and outbound filtering.

Ensure Continuous Email Availability: Email is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud Protection Layer, bundled free of charge with the Barracuda Email Security Gateway, email is spooled for up to 96 hours, with an option to re-direct traffic to a secondary server.

Protect Sensitive Data: Leverage powerful encryption technology to ensure that sensitive data cannot be viewed by outside parties. Outbound filtering and quarantine capabilities certify that every outbound email complies with corporate DLP policies.

Simplify Email Security: Simple and easy to deploy configurations on the Email Security Gateway guarantee that customized email protection is in place in a matter of minutes. Cloud-based centralized management enhances day-to-day workflow and is included with no additional fees.

END POINT SECURITY

See and Stop Threats Across Endpoints in Seconds

COMPLETE PROTECTION: Immediate and effective prevention and detection against all types of attacks — both malware and malware free.

5-SECOND VISIBILITY: DVR for your endpoint. Discover and investigate current and historic endpoint activity in seconds.

IMMEDIATE VALUE: Agent consolidation with one agent doing the work of nine. Deployed in hours, not months, with zero hardware and maintenance cost.

CONTEXT: Continuous monitoring and recording of the endpoint and host events fused with threat intelligence for complete visibility and context across your environment.

CORRELATION: Sophisticated machine learning and behavioral analytics. Go beyond signatures to identify anomalies and distinguish malicious activity from legitimate actions with unprecedented scale and precision.

CONTROL: Powerful prevention capabilities. Stop execution of malicious code, block zero-day exploits, kill processes and contain command, and control callbacks.


DATA LOSS PREVENTION (DLP)

From a damaged reputation to regulatory fines and penalties, a data breach can have devastating consequences. DLP for Web and Email helps you avoid data breaches by enabling you to discover and protect sensitive data in the cloud or on-premise. Use custom or out-of-the-box policies and our unique DLP capabilities to secure your intellectual property and customers’ personal data — and meet compliance requirements quickly.

BENEFITS

  • Manage your risk of insider threats by stopping data loss as well as proactively identifying high-risk users.
  • Quickly deploy easy-to-use security controls to meet compliance and regulatory requirements from auditors and executives.
  • Adopt cloud services like Microsoft® Office 365™ and Box without fear of data theft.
  • Identify sensitive data within images, such as scanned data and screen shots.
  • Unify your security solutions, coordinate defense policies, share intelligence across your security staff and enjoy centralized management of data security.


HOST INTEGRITY MONITORING

File integrity monitoring helps you verify that files and folders with sensitive data have not been changed. Organizations can help maintain file integrity by auditing their file storages regularly. File integrity monitoring software can determine whether anyone made any content changes across your file servers. By adopting a good file integrity monitoring tool, IT teams can stay up to date about unauthorized modifications and thereby minimize security and business risks.

File integrity monitoring is critical for both security and compliance. Any organization that deals with highly sensitive data, such as cardholder information or medical records, is responsible for the security of the file servers where this data resides. In fact, this is one of the top requirements of most common regulations, including PCI DSS 11.5, HIPAA and FISMA.

END USER ANALYTICS

Deep Insight into Physical, Virtual and Hybrid Desktop Deployments for Enhanced End User Experience and Productivity

IT Executives are under constant pressure to cost-effectively optimize the end user experience. In order to better manage their user environments and realize experience and productivity gains, they need to deeply understand the user environment to be able to take the necessary actions to drive improvement.

Effective management of virtual and hybrid environments requires user & app level statistics. System level statistics alone will not be enough as administrators need to “see inside of virtual machines”.

End-user Analytics provides deep insight into the end user environment, giving IT clear understanding of usage patterns and resource utilization. End-user Analytics also provides actionable intelligence, giving IT the specific data needed to make implementation decisions that will better utilize IT resources and deliver superior user experience.

MALWARE HUNTING

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these high profile attacks are organized and are able to persist in your network without detection for months, sometimes years.It’s clear that current real-time security processes are simply ineffective at detecting post-compromise activity, especially as time passes after the initial breach.

Our HUNT approaches threat detection from a completely new perspective – by presuming endpoints are already compromised. It provides an easy-to-use, yet powerful solution to limit risk and manage the breach detection gap by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully evaded existing defenses and established a beachhead within the network.

Our unique, agentless threat hunting platform for Windows and Linux is designed to rapidly assess network endpoints for evidence of compromise – without the burden of complicated equipment or endpoint software installations, and up to 30 times faster than other methods. Reports identify and score the severity of identified issues for swift resolution and risk mitigation.

WEB APPLICATION FIREWALL

Secure Your Web Applications Anywhere

Your outward-facing web applications represent a significant vector for advanced cyber threats that grow more sophisticated daily. Keeping them secure can become a real resource drain on your web admins, DevOps, and security teams, slowing development cycles.

Web Application Firewall simplifies application security, so you can focus on your business. Its comprehensive feature set, versatile deployment options, and ease of use let you automate many application security tasks, whether your web infrastructure resides in an onsite datacenter, in a virtualized environment, or in the cloud.

MULTIFACTOR AUTHENTICATION

MFA is an enterprise-grade user authentication solution based on open standards. MFA provides many (highly configurable) authentication schemes for your Domain users. It supports the combinations of single-factor and multi-factor user access with One-Time Password technologies (OTP) and Universal Second Factor (FIDO-U2F).

The MFA solution is composed of several components including WebADM sever, MFA RADIUS Bridge and Self-Service applications. Combined with RCDevs third-party integrations, MFA supports VPNs, Citrix, Web SSO, ADFS, Linux, Microsoft, Wifi, Web applications and much more…

MFA is already used by thousands of customers in more than 40 countries, including fortune 100 companies. The fast market adoption of MFA is the result of a high-quality product design, an impressive set of features, an increasing panel of integrations and an unbeatable combination of cost-efficiency, security and easy of use to secure corporate access.

MFA provides interfaces including SOAP, REST, JSON-RPC and RADIUS. The native SOAP API is extremely simple and is provided with a WSDL service description file. It is also very easy to implement MFA One-Time Password and/or U2F functionalities into your existing Web applications. Additional integration software provide support for Windows, ADFS, Linux and even Wifi access.

DATA CLASSIFICATION

Understanding your data accurately is the foundation of your sensitive data protection strategy and helps you determine where to apply your data security controls. But once you understand your data, you need to properly classify it. Without security classification, an organization treats all data as if it were the same: You can’t know the level of importance of any data because it hasn’t been properly classified. Failing to perform classification of data increases the risk of sensitive data being compromised across the data security lifecycle. It also increases the possibility that you could be placing security controls on data that isn’t in fact sensitive.

Data classification isn’t a simple task, even for information security experts. Attempting to change user behavior can tempt anyone to postpone it indefinitely. Our Data Platform’s automated persistent data classification software simplifies what until now has been a costly and resource-intensive exercise.

PUBLIC KEY INFRASTRUCTURE (PKI)

To keep any sensitive data secure, Public Key Infrastructure (PKI) and Digital Signatures are necessary technologies at the very heart of your IT-systems. Combining our robust and versatile products with other technologies, your own or our partners’, makes for highly efficient solutions, able to secure your entire organization, cloud, social, mobile or Internet of Things (IoT) system.

We provide digital security products to help protect your IT solutions or entire organization from fraud, counterfeit, piracy and interception.

The right pick of our EJBCA and SignServer products will fulfil your requirements for security, cost-efficiency and performance and they have an almost unique ability to adapt perfectly to your present environment and your particular solution for PKI and Digital Signing. Our PKI products can be delivered both as software products for installation on your own hardware, or as a turn-key PKI Appliance product, including a Hardware Security Module.

SECURITY AWARENESS

Phishing Protection across the Entire Organization

With more than 90% of breaches attributed to successful phishing campaigns, it’s easy for organizations to point to the everyday employee as the root cause – as the problem to be solved. We disagree.  We believe employees –  humans – should be empowered as part of the solution to help strengthen defenses and gather real-time attack intelligence to stop attacks in progress.

Our Human Phishing Defense solutions provide comprehensive phishing defense from the inbox to the SOC, conditioning users to recognize and report phishing attacks while eliminating phishing related breaches by speeding the collection and response of phishing threats in real time. With more than 90% of breaches caused as a result of spear-phishing, it’s no surprise that more than half of the Fortune 100 trusts us to help neutralize this dangerous attack vector. Watch this video to learn more.

PRIVILEGE ACCESS MANAGEMENT

Privilege Access Management (PAM) is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. PAM is a quickly deployable enterprise device, completely independent from clients and servers – integrating seamlessly into existing networks. PAM is a core component of the Contextual Security Intelligence Suite. It captures the activity data necessary for user profiling and enables full user session drill down for forensic investigation in CSI.

PAM acts as a centralized authentication and access-control point in your IT environment which improves security and reduces user administration costs. The granular access management helps you to control who can access what and when on your servers.

SECURITY  INCIDENT AND EVENT MANAGEMENT (SIEM)

Integrated Security, Performance, and Availability Monitoring in One Application

Security breaches have, on average, taken nearly eight months to detect and are most often discovered by third-parties. If you can’t see, in real time, what’s happening throughout your network and remediate immediately, threats will proliferate, which can have devastating consequences for your business. FortiSIEM is an all-in-one platform that lets you rapidly find and fix security threats and manage compliance standards while reducing complexity, increasing critical application availability, and enhancing IT management efficiency.

Stay ahead of threats with the SIEM platform’s:

  • Powerful and patented analytics engine for real-time correlation and alerting
  • Automated, self-learning Configuration Management Database (CMDB) and event consolidation
  • Multitenancy and scalability – ideal for cloud environments and MSPs
  • Robust, scalable log management
  • Pre-built compliance reports covering HIPAA, PCI DSS, SOX, and more

Comprehensive and holistic performance and availability management