AlgoSec Firewall Analyser

 

Network abstraction and policy analysis

AlgoSec Firewall Analyser delivers visibility and analysis of complex network security policies across on-premise and cloud networks. It automates and simplifies security operations including troubleshooting, auditing and risk analysis.

Instantly visualise your network
security policy

Firewall Analyser automatically pulls information from a wide range of devices to generate an interactive network topology map.

Mitigate risk with baseline
configuration compliance

Firewall Analyser minimises the risk that devices will be exploited, by continuously monitoring them against custom-defined or recommended device configuration baselines which are provided for each product.

Easily define and enforce
network segmentation

With Firewall Analyser, you can quickly confirm that your existing network security policy does not violate your network segmentation strategy or block critical business services, and meets compliance requirements.

Appliansys DNSBox

 

IPAM, DHCP and DNS made easy

DNSBOX combines the benefits of enterprise-class DDI software with the security, reliability and ease-of-use of the appliance format – to help organisations increase DDI control and protection, and reduce complexity and cost.

Simplify DDI admin

A DDI management solution will make administration of your network’s names and numbers – planning IP address usage, running DNS and DHCP services – much easier.

Increase control at all levels

With all information held in a single centralised system, DNSBOX helps increase control over the data, how workloads are shared and the resulting quality of your DDI services.

Protect your DDI services

DDI services are top security targets. An integrated DDI solution built on a robust appliance platform, DNSBOX protects them from high-impact security threats and service failures, and greatly reduces the risks.

Certes Network Zero Trust WAN

 

Protect data and application in motion over any environment

Trust is the foundation of IT security. But the trust model of today’s security architecture is broken.

 

To fix the broken trust model, the Certes Zero Trust security architecture takes a unique software-defined approach that dramatically cuts the risk of data breaches. Instead of a trust model based on infrastructure, networks or devices, trust for WAN connectivity is based on keys and encryptors that are independent of the infrastructure.

CryptoFlow Creator Software

Certes Networks’ award-winning CryptoFlow software provides key, policy and device management for all Certes Network encryptors. It safeguards application traffic, enabling secure connectivity over any infrastructure without compromising network device or application performance.

Patented Layer 4 stealth encryption

Certes Networks’ patented Layer 4 stealth encryption enables organisations to extend trust across the WAN with network encryption that is decoupled from the infrastructure.

Puts the CISO back in control of
enterprise security

Extending trust across the WAN using patented Layer 4 stealth encryption delivers control back to the CISO. Trust is decoupled from perimeter and infrastructure. This facilitates business agility in today’s digital world, whilst enabling and maintaining regulatory compliance.

Infoexpress Network Access Control

 

Know what’s on ALL your networks

Easy NAC is an agentless NAC that provides visibility, control and scalability – without any network, configuration or device changes.

Discover everything

Easy NAC automatically detects, profiles and governs device access with extensive software and cloud orchestration modules.

Take control

Safeguard assets by knowing and controlling your networks with NAC. With Easy NAC, deploying NAC is no longer slow, difficult or expensive.

Easily scale

Extend NAC to remote sites with inexpensive vLinks. With no on-site configuration or network changes, even non-IT personnel can install vLinks to any site in minutes.

MONITORAPP Web Application Firewall

 

Protect your website from hacking

Application Insight Web Application Firewall (AIWAF) is a dedicated website security solution for inbound traffic that protects your website from hacking.

 

Configured as PROXY in the network, AIWAF is a specific application firewall that addresses the limitations of existing security appliances such as generic firewalls and IPS.

Block various patterns of web attack

  • OWASP Top 10
  • XSS / Injection Attack Block
  • HTTP based DDOS Attack Block
  • Application Exploits Block
  • SSL Termination
  • Latest Web Vulnerability Attack Block via Automated Updated Function

Intuitive and user-friendly interface
based on web

  • Various log search and easy management
  • Interworking with integrated log via SNMP and SIEM
  • Provides statistics and reporting for enhanced visibility

Protect from Personal Information
Leakage (Masking)

MONITORAPP Web Application Firewall blocks the uploading and/or downloading of files which contain personal information.

Netsparker

 

Automatically find security flaws in your web applications

Developed as an automatic, dead accurate and easy-to-use web application security scanner, Netsparker automatically finds and reports security vulnerabilities in your websites, web applications and web services – regardless of the platform and technology they are built with.

Scan thousands of web applications
in hours, not days

With Netsparker’s exclusive pre-scan automation and Proof-Based Scanning technology, you can easily scale up and scan thousands of web applications. Within a matter of hours, you can detect vulnerabilities and have the informed and accurate results developers need to start fixing issues.

Scan custom, legacy and off-the-shelf
web applications

Netsparker can crawl and scan any web application regardless of the technology it is built with. It can scan HTML5, Web 2.0 Applications, Single Page Applications (SPA) and any other type of application that relies heavily on client-side technology.

Actionable insights and results

Netsparker’s Proof-Based Scanning technology helps automatically verify any identified vulnerabilities so your team does not have to. It also automatically checks developer fixes, so most of the post scan and vulnerability triage processes are automated.

Nipper Studio

 

Harden your network infrastructure before attacks happen

Nipper Studio was the 1st advanced and detailed configuration auditing tool in the world. It helps organisations harden and secure vital network devices, such as firewalls, switches and routers – so you can quickly identify undiscovered vulnerabilities, prevent attacks in minutes and keep your company secure.

Detailed configuration reporting

Scriptable for 24/7 vulnerability alerts, 365 days a year, Nipper Studio’s detailed configuration reporting gives quick, clear views of device settings. So companies can discover misconfigured systems and firewall, switch and router vulnerabilities – effortlessly.

Supports security compliance goals

Nipper Studio audits against industry standards such as CIS, STIG and NIST benchmarks. Its “best practice” security audits also include industry checks, rating systems and mitigation advice. So you can meet your security targets faster and become compliant.

Easy to implement and use

An agentless tool, Nipper Studio integrates easily with existing systems. There is no additional software or systems to install or maintain. Automated configuration auditing means workloads can be customised, scheduled and scripted to work on multiple platforms.

SECUI IPS/DDoS

 

Faster, more powerful and more secure

SECUI MF2 is a multi-function firewall that is equipped with the technology to fight against the latest network security threat of flexible hardware and software architecture.

Block harmful traffic through virtual
protection domain

In addition to a strong Anti-DDoS function, it is easy to set up and operate through through IPS policy setting Wizar.

UTM that maintains high performance

It uses a platform that can resolve the latest security issue, such as IPv6 support and IPTV security, and is able to expand and operate a variety of security functions.

Forensics based information and analysis

SECUI MF2 provides forensics based information for different analysis of an attack:

  • By maximum log download of 3,000,000 per second
  • By secure audit log according to the DDoS attack
  • By strong log analysis engine

Secure Web Appliance

 

Advanced web protection made simple

Get the ultimate in web security, control and insights with Sophos Web Appliance. It’s web protection that’s effective, affordable and easy – offering lightning performance that won’t slow users down.

Easy deployment, easy management,
easy monitoring 

With Sophos Web Appliance, it’s easy to get up and running quickly. We’ve also optimised daily workflow routines, making them intuitive and also streamlined. Best of all, your appliance is closely monitored around the clock. So if there’s a problem, we’ll be on top of it before you even need to call.

Protection everywhere

Sophos Web Appliance works seamlessly with your Sophos Secured Windows Endpoints to provide complete web protection for off-site employees – protecting every user, on every device, everywhere they go.

Lightning performance

Sophos Web Appliance delivers the ultimate in performance, so your users and mission-critical web applications work lag-free, with no noticeable latency.

Sophos XG Firewall

 

The world’s best visibility, protection and response.

Sophos XG Firewall provides unprecedented visibility into your network, users and applications directly from the control centre. Superior visibility into risky activity, suspicious traffic and advanced threats also exposes hidden risks and helps you regain control of your network.

Stop unknown threats

XG Firewall offers the best protection against the latest advanced threats like ransomware, cryptomining, bots, worms, hacks, breaches and APTs.

Powered by deep learning

Developed by data scientists at SophosLabs to deliver the industry’s best detection rates without using signatures, XG Firewall catches previously unseen malware lurking in suspicious payloads, quickly and effectively.

Intercept exploits

XG Firewall integrates some of the best technology from our leading Intercept X next-gen endpoint protection like exploit prevention and CryptoGuard Protection to identify malware exploits and ransomware before it gets on your network.

NPCore ZombieZERO Network APT

ZombieZERO Inspector N (Network APT) is a security solution that detects and blocks new malware and malware variants by collecting valid data from the network traffic. URLs, files and other information collected from the network are analyzed using a virtual machine in order to respond to and defend against network APT. Using behavior-based multi-dimensional analysis (anti-virus engine, static YARA, dynamic behavior analysis, reputation analysis), new malware and malware variants that are not yet known are detected, and preemptive response can be made against potential internal threats.

Detecting and Blocking Malware Infiltration through Network
Traffic

ZombieZERO Network APT (formerly known as Inspector N) collects valid data from incoming network traffic, including files, URLs, and protocols like HTTP, HTTPS, SMTP, POP, IMAP, etc. Its purpose is to detect, analyze, and block new and variant malicious codes, specifically Advanced Persistent Threat (APT) attacks.

Zero-Day Vulnerability Mitigation

ZombieZERO Network APT employs a comprehensive approach to detection and analysis, utilizing various techniques for robust protection. These techniques include Blacklist/Whitelist filtering, integration with Bitdefender antivirus functionality, static analysis using Yara Rules, dynamic analysis through a customized sandbox environment for behavioral analysis, and reputation analysis leveraging Virustotal.

Continuous Threat Detection based on MITRE ATT&CK framework
classification

ZombieZERO Network APT provides the flowchart of the APT attack process by categorizing malicious codes based on Indicators of Compromise (IOCs) aligned with the MITRE ATT&CK framework. This capability enables the identification of attack techniques and tactics employed by the malicious code, providing a comprehensive understanding of the utilized attack methods.

Virtual Machine Bypass Prevention

ZombieZERO Network APT detects and analyzes dynamic behaviors by disguising the unique information of the virtual machine. This includes changing the CPUID of the sandbox’s virtual machine to match that of the real machine. By tricking malicious code into perceiving the virtual environment as the real machine, it becomes easier to detect and analyze dynamic behaviors.