Network Security

Next Generation UTM Firewall

Unified Threat Management (UTM) firewall uses Deep Packet Inspection (DPI) technology to scan incoming packets for attacks. It operates on the application layer. Incoming packets are compared against the intrusion signature database. If matched, it is an attack packet and will be dropped. Otherwise, it is a good packet and let go.

– Web & Application control

Application control is being used to control Internet applications such as IM tools, gaming clients, and P2P downloading clients. Application control will detect the connection, scan for the application signature and categorise the application accordingly.

– IPS solution

Intrusion Prevention Systems (IPS) solutions provide protection against sophisticated threats

* Targeted attacks
* Adaptive Persistent Threats (APTs)
* Botnets
* SQL injection attacks
* Malware targeting application and OS vulnerabilities
* E-mail Anti-Spam & Antivirus

To achieve an efficient, effective corporate communication and collaboration, organisations nowadays need more than security against spam and malware. A comprehensive email governance solution is needed to combine granular policy management, real-time visibility into email activity, and the ability to handle massive volume and huge files. E-mail Anti-Spam & Antivirus solution is the solution for comprehensive email governance.