Next Generation Firewalls
Firewalls of previous years filtered the network traffic at a low level, by ports and addresses. Integrated firewalls that combine all the components of protection - intrusion detection and prevention systems, firewall, VPN, antivirus, antispam, content filter, load balancing, reporting tools and even DLP became modern alternative to them. Such firewalls are represented both by software and UTM class appliances. New generation firewalls are centrally managed and use the information about applications and users generating traffic.
Protection against Targeted Attacks and Zero-Day Attacks
Modern cyber-attacks are increasingly focused on a particular field (banks, retail, industry, public sector, online stores, etc.) or a specific company. The unique nature of such threats provides the ability to easily bypass the classical protection tools - antiviruses, firewalls, IPS, mail and web gateways, etc. The ultimate goal of the attackers is to take money to their own advantage, implement espionage, theft of valuable information, extortion, stop production and make equipment inoperable.
We offer services for introduction of specialized tools for detecting modern attacks (sandboxes, detectors of anomalies, process monitors on workstations), as well as services (incident analyst, localization of network infection, actions to prevent attacks and exclusion of repeated incidents).
Multiple software and hardware firewalls of different manufacturers installed in a large and distributed network, may form an entangled and contradictory structure with their rules and other configuration issues. A dedicated solution for analysis, configuration control and auditing of firewall management will help to understand the current state of affairs and establish the process of automated and optimized management.
We know how to implement such intelligent solutions. We will help not only to deploy the software, but also to conduct analysis, identify cycles and contradictions of routing, make recommendations for optimization. As a result, you get a transparently configured network, which then will simply be supported from the management console.