AlgoSec Firewall Analyser delivers visibility and analysis of complex network security policies across on-premise and cloud networks. It automates and simplifies security operations including troubleshooting, auditing and risk analysis.
Firewall Analyser automatically pulls information from a wide range of devices to generate an interactive network topology map.
Firewall Analyser minimises the risk that devices will be exploited, by continuously monitoring them against custom-defined or recommended device configuration baselines which are provided for each product.
With Firewall Analyser, you can quickly confirm that your existing network security policy does not violate your network segmentation strategy or block critical business services, and meets compliance requirements.
DNSBOX combines the benefits of enterprise-class DDI software with the security, reliability and ease-of-use of the appliance format – to help organisations increase DDI control and protection, and reduce complexity and cost.
A DDI management solution will make administration of your network’s names and numbers – planning IP address usage, running DNS and DHCP services – much easier.
With all information held in a single centralised system, DNSBOX helps increase control over the data, how workloads are shared and the resulting quality of your DDI services.
DDI services are top security targets. An integrated DDI solution built on a robust appliance platform, DNSBOX protects them from high-impact security threats and service failures, and greatly reduces the risks.
Trust is the foundation of IT security. But the trust model of today’s security architecture is broken.
To fix the broken trust model, the Certes Zero Trust security architecture takes a unique software-defined approach that dramatically cuts the risk of data breaches. Instead of a trust model based on infrastructure, networks or devices, trust for WAN connectivity is based on keys and encryptors that are independent of the infrastructure.
Certes Networks’ award-winning CryptoFlow software provides key, policy and device management for all Certes Network encryptors. It safeguards application traffic, enabling secure connectivity over any infrastructure without compromising network device or application performance.
Certes Networks’ patented Layer 4 stealth encryption enables organisations to extend trust across the WAN with network encryption that is decoupled from the infrastructure.
Extending trust across the WAN using patented Layer 4 stealth encryption delivers control back to the CISO. Trust is decoupled from perimeter and infrastructure. This facilitates business agility in today’s digital world, whilst enabling and maintaining regulatory compliance.
Easy NAC is an agentless NAC that provides visibility, control and scalability – without any network, configuration or device changes.
Easy NAC automatically detects, profiles and governs device access with extensive software and cloud orchestration modules.
Safeguard assets by knowing and controlling your networks with NAC. With Easy NAC, deploying NAC is no longer slow, difficult or expensive.
Extend NAC to remote sites with inexpensive vLinks. With no on-site configuration or network changes, even non-IT personnel can install vLinks to any site in minutes.
Application Insight Web Application Firewall (AIWAF) is a dedicated website security solution for inbound traffic that protects your website from hacking.
Configured as PROXY in the network, AIWAF is a specific application firewall that addresses the limitations of existing security appliances such as generic firewalls and IPS.
MONITORAPP Web Application Firewall blocks the uploading and/or downloading of files which contain personal information.
Developed as an automatic, dead accurate and easy-to-use web application security scanner, Netsparker automatically finds and reports security vulnerabilities in your websites, web applications and web services – regardless of the platform and technology they are built with.
With Netsparker’s exclusive pre-scan automation and Proof-Based Scanning technology, you can easily scale up and scan thousands of web applications. Within a matter of hours, you can detect vulnerabilities and have the informed and accurate results developers need to start fixing issues.
Netsparker can crawl and scan any web application regardless of the technology it is built with. It can scan HTML5, Web 2.0 Applications, Single Page Applications (SPA) and any other type of application that relies heavily on client-side technology.
Netsparker’s Proof-Based Scanning technology helps automatically verify any identified vulnerabilities so your team does not have to. It also automatically checks developer fixes, so most of the post scan and vulnerability triage processes are automated.
Nipper Studio was the 1st advanced and detailed configuration auditing tool in the world. It helps organisations harden and secure vital network devices, such as firewalls, switches and routers – so you can quickly identify undiscovered vulnerabilities, prevent attacks in minutes and keep your company secure.
Scriptable for 24/7 vulnerability alerts, 365 days a year, Nipper Studio’s detailed configuration reporting gives quick, clear views of device settings. So companies can discover misconfigured systems and firewall, switch and router vulnerabilities – effortlessly.
Nipper Studio audits against industry standards such as CIS, STIG and NIST benchmarks. Its “best practice” security audits also include industry checks, rating systems and mitigation advice. So you can meet your security targets faster and become compliant.
An agentless tool, Nipper Studio integrates easily with existing systems. There is no additional software or systems to install or maintain. Automated configuration auditing means workloads can be customised, scheduled and scripted to work on multiple platforms.
SECUI MF2 is a multi-function firewall that is equipped with the technology to fight against the latest network security threat of flexible hardware and software architecture.
In addition to a strong Anti-DDoS function, it is easy to set up and operate through through IPS policy setting Wizar.
It uses a platform that can resolve the latest security issue, such as IPv6 support and IPTV security, and is able to expand and operate a variety of security functions.
SECUI MF2 provides forensics based information for different analysis of an attack:
Get the ultimate in web security, control and insights with Sophos Web Appliance. It’s web protection that’s effective, affordable and easy – offering lightning performance that won’t slow users down.
With Sophos Web Appliance, it’s easy to get up and running quickly. We’ve also optimised daily workflow routines, making them intuitive and also streamlined. Best of all, your appliance is closely monitored around the clock. So if there’s a problem, we’ll be on top of it before you even need to call.
Sophos Web Appliance works seamlessly with your Sophos Secured Windows Endpoints to provide complete web protection for off-site employees – protecting every user, on every device, everywhere they go.
Sophos Web Appliance delivers the ultimate in performance, so your users and mission-critical web applications work lag-free, with no noticeable latency.
Sophos XG Firewall provides unprecedented visibility into your network, users and applications directly from the control centre. Superior visibility into risky activity, suspicious traffic and advanced threats also exposes hidden risks and helps you regain control of your network.
XG Firewall offers the best protection against the latest advanced threats like ransomware, cryptomining, bots, worms, hacks, breaches and APTs.
Developed by data scientists at SophosLabs to deliver the industry’s best detection rates without using signatures, XG Firewall catches previously unseen malware lurking in suspicious payloads, quickly and effectively.
XG Firewall integrates some of the best technology from our leading Intercept X next-gen endpoint protection like exploit prevention and CryptoGuard Protection to identify malware exploits and ransomware before it gets on your network.
ZombieZERO Inspector N (Network APT) is a security solution that detects and blocks new malware and malware variants by collecting valid data from the network traffic. URLs, files and other information collected from the network are analyzed using a virtual machine in order to respond to and defend against network APT. Using behavior-based multi-dimensional analysis (anti-virus engine, static YARA, dynamic behavior analysis, reputation analysis), new malware and malware variants that are not yet known are detected, and preemptive response can be made against potential internal threats.
ZombieZERO Network APT (formerly known as Inspector N) collects valid data from incoming network traffic, including files, URLs, and protocols like HTTP, HTTPS, SMTP, POP, IMAP, etc. Its purpose is to detect, analyze, and block new and variant malicious codes, specifically Advanced Persistent Threat (APT) attacks.
ZombieZERO Network APT employs a comprehensive approach to detection and analysis, utilizing various techniques for robust protection. These techniques include Blacklist/Whitelist filtering, integration with Bitdefender antivirus functionality, static analysis using Yara Rules, dynamic analysis through a customized sandbox environment for behavioral analysis, and reputation analysis leveraging Virustotal.
ZombieZERO Network APT provides the flowchart of the APT attack process by categorizing malicious codes based on Indicators of Compromise (IOCs) aligned with the MITRE ATT&CK framework. This capability enables the identification of attack techniques and tactics employed by the malicious code, providing a comprehensive understanding of the utilized attack methods.
ZombieZERO Network APT detects and analyzes dynamic behaviors by disguising the unique information of the virtual machine. This includes changing the CPUID of the sandbox’s virtual machine to match that of the real machine. By tricking malicious code into perceiving the virtual environment as the real machine, it becomes easier to detect and analyze dynamic behaviors.