top of page

Network abstraction and policy analysis

AlgoSec Firewall Analyser delivers visibility and analysis of complex network security policies across on-premise and cloud networks. It automates and simplifies security operations including troubleshooting, auditing and risk analysis.

Instantly visualise your network
security policy

Mitigate risk with baseline
configuration compliance

Easily define and enforce
network segmentation

Firewall Analyser automatically pulls information from a wide range of devices to generate an interactive network topology map.

Firewall Analyser minimises the risk that devices will be exploited, by continuously monitoring them against custom-defined or recommended device configuration baselines which are provided for each product.

With Firewall Analyser, you can quickly confirm that your existing network security policy does not violate your network segmentation strategy or block critical business services, and meets compliance requirements.

dnsbox

Appliansys DNSBox

IPAM, DHCP and DNS made easy

DNSBOX combines the benefits of enterprise-class DDI software with the security, reliability and ease-of-use of the appliance format – to help organisations increase DDI control and protection, and reduce complexity and cost.

Simplify DDI admin

Increase control at all levels

Protect your DDI services

A DDI management solution will make administration of your network’s names and numbers – planning IP address usage, running DNS and DHCP services – much easier.

With all information held in a single centralised system, DNSBOX helps increase control over the data, how workloads are shared and the resulting quality of your DDI services.

DDI services are top security targets. An integrated DDI solution built on a robust appliance platform, DNSBOX protects them from high-impact security threats and service failures, and greatly reduces the risks.

CERTES NETWORK

Certes Network Zero Trust WAN

Protect data and application in motion over any environment

Trust is the foundation of IT security. But the trust model of today’s security architecture is broken.

 

To fix the broken trust model, the Certes Zero Trust security architecture takes a unique software-defined approach that dramatically cuts the risk of data breaches. Instead of a trust model based on infrastructure, networks or devices, trust for WAN connectivity is based on keys and encryptors that are independent of the infrastructure.

CryptoFlow Creator Software

Patented Layer 4 stealth encryption

Puts the CISO back in control of
enterprise security

Certes Networks’ award-winning CryptoFlow software provides key, policy and device management for all Certes Network encryptors. It safeguards application traffic, enabling secure connectivity over any infrastructure without compromising network device or application performance.

Certes Networks’ patented Layer 4 stealth encryption enables organisations to extend trust across the WAN with network encryption that is decoupled from the infrastructure.

Extending trust across the WAN using patented Layer 4 stealth encryption delivers control back to the CISO. Trust is decoupled from perimeter and infrastructure. This facilitates business agility in today’s digital world, whilst enabling and maintaining regulatory compliance.

Infoexpress

Infoexpress Network Access Control

Know what’s on ALL your networks

Easy NAC is an agentless NAC that provides visibility, control and scalability – without any network, configuration or device changes.

Discover everything

Take control

Easily scale

Easy NAC automatically detects, profiles and governs device access with extensive software and cloud orchestration modules.

Safeguard assets by knowing and controlling your networks with NAC. With Easy NAC, deploying NAC is no longer slow, difficult or expensive.

Extend NAC to remote sites with inexpensive vLinks. With no on-site configuration or network changes, even non-IT personnel can install vLinks to any site in minutes.

monitorapp

MONITORAPP Web Application Firewall

Protect your website from hacking

Application Insight Web Application Firewall (AIWAF) is a dedicated website security solution for inbound traffic that protects your website from hacking.

 

Configured as PROXY in the network, AIWAF is a specific application firewall that addresses the limitations of existing security appliances such as generic firewalls and IPS.

Block various patterns of web attack

Intuitive and user-friendly interface
based on web

Protect from Personal Information
Leakage (Masking)

  • OWASP Top 10

  • XSS / Injection Attack Block

  • HTTP based DDOS Attack Block

  • Application Exploits Block

  • SSL Termination

  • Latest Web Vulnerability Attack Block via Automated Updated Function

  • Various log search and easy management

  • Interworking with integrated log via SNMP and SIEM

  • Provides statistics and reporting for enhanced visibility

MONITORAPP Web Application Firewall blocks the uploading and/or downloading of files which contain personal information.

netsparker

Netsparker

Automatically find security flaws in your web applications

Developed as an automatic, dead accurate and easy-to-use web application security scanner, Netsparker automatically finds and reports security vulnerabilities in your websites, web applications and web services – regardless of the platform and technology they are built with.

Scan thousands of web applications
in hours, not days

Scan custom, legacy and off-the-shelf
web applications

Actionable insights and results

With Netsparker’s exclusive pre-scan automation and Proof-Based Scanning technology, you can easily scale up and scan thousands of web applications. Within a matter of hours, you can detect vulnerabilities and have the informed and accurate results developers need to start fixing issues.

Netsparker can crawl and scan any web application regardless of the technology it is built with. It can scan HTML5, Web 2.0 Applications, Single Page Applications (SPA) and any other type of application that relies heavily on client-side technology.

Netsparker’s Proof-Based Scanning technology helps automatically verify any identified vulnerabilities so your team does not have to. It also automatically checks developer fixes, so most of the post scan and vulnerability triage processes are automated.

nipper

Nipper Studio

Harden your network infrastructure before attacks happen

Nipper Studio was the 1st advanced and detailed configuration auditing tool in the world. It helps organisations harden and secure vital network devices, such as firewalls, switches and routers – so you can quickly identify undiscovered vulnerabilities, prevent attacks in minutes and keep your company secure.

Detailed configuration reporting

Supports security compliance goals

Easy to implement and use

Scriptable for 24/7 vulnerability alerts, 365 days a year, Nipper Studio’s detailed configuration reporting gives quick, clear views of device settings. So companies can discover misconfigured systems and firewall, switch and router vulnerabilities – effortlessly.

Nipper Studio audits against industry standards such as CIS, STIG and NIST benchmarks. Its “best practice” security audits also include industry checks, rating systems and mitigation advice. So you can meet your security targets faster and become compliant.

An agentless tool, Nipper Studio integrates easily with existing systems. There is no additional software or systems to install or maintain. Automated configuration auditing means workloads can be customised, scheduled and scripted to work on multiple platforms.

SECUI IPS

SECUI IPS/DDoS

Faster, more powerful and more secure

SECUI MF2 is a multi-function firewall that is equipped with the technology to fight against the latest network security threat of flexible hardware and software architecture.

Block harmful traffic through virtual
protection domain

UTM that maintains high performance

Forensics based information and analysis

In addition to a strong Anti-DDoS function, it is easy to set up and operate through through IPS policy setting Wizar.

It uses a platform that can resolve the latest security issue, such as IPv6 support and IPTV security, and is able to expand and operate a variety of security functions.

SECUI MF2 provides forensics based information for different analysis of an attack:

  • By maximum log download of 3,000,000 per second

  • By secure audit log according to the DDoS attack

  • By strong log analysis engine

secure web app

Secure Web Appliance

Advanced web protection made simple

Get the ultimate in web security, control and insights with Sophos Web Appliance. It’s web protection that’s effective, affordable and easy – offering lightning performance that won’t slow users down.

Easy deployment, easy management,
easy monitoring

Protection everywhere

Lightning performance

With Sophos Web Appliance, it’s easy to get up and running quickly. We’ve also optimised daily workflow routines, making them intuitive and also streamlined. Best of all, your appliance is closely monitored around the clock. So if there’s a problem, we’ll be on top of it before you even need to call.

Sophos Web Appliance works seamlessly with your Sophos Secured Windows Endpoints to provide complete web protection for off-site employees – protecting every user, on every device, everywhere they go.

Sophos Web Appliance delivers the ultimate in performance, so your users and mission-critical web applications work lag-free, with no noticeable latency.

sophos xg fw

Sophos XG Firewall

The world’s best visibility, protection and response.

Sophos XG Firewall provides unprecedented visibility into your network, users and applications directly from the control centre. Superior visibility into risky activity, suspicious traffic and advanced threats also exposes hidden risks and helps you regain control of your network.

Stop unknown threats

Powered by deep learning

Intercept exploits

XG Firewall offers the best protection against the latest advanced threats like ransomware, cryptomining, bots, worms, hacks, breaches and APTs.

Developed by data scientists at SophosLabs to deliver the industry’s best detection rates without using signatures, XG Firewall catches previously unseen malware lurking in suspicious payloads, quickly and effectively.

XG Firewall integrates some of the best technology from our leading Intercept X next-gen endpoint protection like exploit prevention and CryptoGuard Protection to identify malware exploits and ransomware before it gets on your network.

NPCORE

NPCore ZombieZERO Network APT

ZombieZERO Inspector N (Network APT) is a security solution that detects and blocks new malware and malware variants by collecting valid data from the network traffic. URLs, files and other information collected from the network are analyzed using a virtual machine in order to respond to and defend against network APT. Using behavior-based multi-dimensional analysis (anti-virus engine, static YARA, dynamic behavior analysis, reputation analysis), new malware and malware variants that are not yet known are detected, and preemptive response can be made against potential internal threats.

Detecting and Blocking Malware Infiltration through Network
Traffic

Zero-Day Vulnerability Mitigation

Continuous Threat Detection based on MITRE ATT&CK framework
classification

ZombieZERO Network APT (formerly known as Inspector N) collects valid data from incoming network traffic, including files, URLs, and protocols like HTTP, HTTPS, SMTP, POP, IMAP, etc. Its purpose is to detect, analyze, and block new and variant malicious codes, specifically Advanced Persistent Threat (APT) attacks.

ZombieZERO Network APT employs a comprehensive approach to detection and analysis, utilizing various techniques for robust protection. These techniques include Blacklist/Whitelist filtering, integration with Bitdefender antivirus functionality, static analysis using Yara Rules, dynamic analysis through a customized sandbox environment for behavioral analysis, and reputation analysis leveraging Virustotal.

ZombieZERO Network APT provides the flowchart of the APT attack process by categorizing malicious codes based on Indicators of Compromise (IOCs) aligned with the MITRE ATT&CK framework. This capability enables the identification of attack techniques and tactics employed by the malicious code, providing a comprehensive understanding of the utilized attack methods.

Virtual Machine Bypass Prevention

ZombieZERO Network APT detects and analyzes dynamic behaviors by disguising the unique information of the virtual machine. This includes changing the CPUID of the sandbox’s virtual machine to match that of the real machine. By tricking malicious code into perceiving the virtual environment as the real machine, it becomes easier to detect and analyze dynamic behaviors.

bottom of page