UTM and Endpoint Security

SOPHOS UTM

Unified Threat Management and Endpoint Security

Your all in one network protection.

PRODUCT OVERVIEW

IT security products have become as complex as the networks they’re trying to secure. At Sophos, the solution to complexity is not more complexity. Sophos tackles security challenges with clarity and confidence, knowing that simple security is better security.

Sophos began producing antivirus and encryption products nearly 30 years ago. Today Sophos products help secure the networks used by 100 million people in 150 countries and 100,000 businesses.

As IT networks grow in complexity, Sophos is focused on keeping IT security simple and reliable. Sophos knows that a proper security strategy must include networks, servers and devices—all devices—managed easily through the cloud.

Sophos products allow you to secure every end point of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices. What’s more, securing these devices is made possible through products that fit your precise needs; to ensure your network’s security by providing the one thing no one else can: Simplicity.

Deep Learning Protection

Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures.

Lightning Speed

Sophos UTM is engineered to deliver outstanding performance. We built our UTM using Intel multi-core technology, solid-state drives, and accelerated in-memory content scanning. Potent, powerful … fast!

 

All-in-One Protection

We offer the latest next-gen firewall protection you need, plus features you can’t get anywhere else – including mobile, web, endpoint email encryption, and DLP. No extra hardware. No extra cost. Simply choose what you want to deploy.

Logging & Reporting

Sophos UTM built-in reporting means you’ll know exactly what’s happening with your users. Fix problems fast and shape your policies, keeping your users secure while boosting network performance. And, you get detailed reports as standard, stored locally with no separate tools required.

Miercom Test Results

As a Gartner Magic Quadrant Leader for UTM, Mobile Data Protection and Endpoint, we're at the forefront of the security industry.

Sophos UTM is easy to use thanks to the configurable real-time dashboard, flexible modular licensing, and intuitive reusable network object definitions.


Warning: Undefined array key 1 in D:\InetPub\vhosts\naizakdistribution.com\httpdocs\wp-content\plugins\jet-elements\includes\addons\jet-elements-video.php on line 2082

Warning: Undefined array key 1 in D:\InetPub\vhosts\naizakdistribution.com\httpdocs\wp-content\plugins\jet-elements\includes\addons\jet-elements-video.php on line 2082

Warning: Undefined array key 1 in D:\InetPub\vhosts\naizakdistribution.com\httpdocs\wp-content\plugins\jet-elements\includes\addons\jet-elements-video.php on line 2082

Warning: Undefined array key 1 in D:\InetPub\vhosts\naizakdistribution.com\httpdocs\wp-content\plugins\jet-elements\includes\addons\jet-elements-video.php on line 2082
Play Video

What are you waiting for?

Next-Gen Firewalls

Products

Comprehensive Portfolio of Network Security and Risk Management Solutions

Complete Protection for Enterprises and Service Providers.

PRODUCT OVERVIEW

Hillstone Networks’ Enterprise Security and Risk Management solutions provide visibility, intelligence, and protection to ensure enterprises can comprehensively see, thoroughly understand, and rapidly act against cyber-threats. Recognized by leading analysts and trusted by global enterprises, Hillstone’s solutions cover the enterprise from edge to cloud while improving total-cost-of-ownership.

Defending the Network Perimeter

Network perimeter is the first line of the security defense for enterprise, Hillstone provides the next generation perimeter solutions with the unparalleled threat visibility and protection without compromising the network performance and business continuity, these include:

  • Next-Generation Firewall (NGFW)
  • Network Intrusion Prevention System (NIPS)

Preventing Breaches in the Enterprise

Enterprises are in a post-breach world, so the breach prevention solutions are necessary to compliment with the perimeter solutions. Hillstone provides the most advanced breach prevention solutions with the AI driven security analytics and kill chain technologies. They include:

  • Intelligent Next-Generation Firewalls (iNGFW)
  • Server Breach Detection System (sBDS)

Protecting the Modern Data Center

Modern data centers are growing and transforming fast as the explosion of internet traffic. Hillstone data center security solution offers outstanding performance, carrier-grade reliability, and comprehensive scalability, for high-speed service providers, large enterprises and carrier networks.

  • Data Center Next-Generation Firewalls (DCFW)

Protecting your Cloud Infrastructure

Hillstone provides two best-in-class products (CloudHive and CloudEdge) to defend your cloud infrastructure, applications and data, compatible with any virtualization environment. These solutions include:

  • Micro-segmentation for Virtualized Data Centers
  • Security Solution for Network Function Virtualization (NFV)
  • Protection for the Virtual Private Cloud (VPC) in public cloud

Providing Centralized Security Management

With cloud-based security management and analytics, a security management platform, and a security audit platform, Hillstone’s suite of security management products provides security teams with the tools they need to manage their networks. These include:

  • Cloud-based Security Management and Analytics Platform
  • Centralized Security Management, Configuration and Monitoring solution
  • Centralized log retention and high-speed retrieval

Providing multi-layer threat prevention services

With the rapid rise in ransomware attacks, enterprises are hard pressed to find and deploy viable security solutions that can detect and mitigate these attacks early, quickly and effectively before they can wreak their damage. With Hillstone’s layered defense, Hillstone solutions can detect and mitigate even the most sophisticated and rapidly evolving ransomware variants at any or all attack stages, including post breach. Those include:

  • StoneShield: Abnormal Behavior Detection and Advanced Malware Detection
  • Sandbox: Unknown malware detection and prevention
  • Intrusion Prevention: Network intrusion detection and prevention
  • Anti-virus: Known virus and malware detection and prevention
  • URL Filtering: URL category and flow-based malicious web filtering
  • Anti-Spam: Real-time spam classification and prevention
  • Botnet C&C Prevention: Discover intranet botnet and malicious C&C connections 
  • IP Reputation: Identify and filter traffic from risky IPs 

Hillstone Networks Recognized in Gartner Market Guide for Cloud Workload Protection Platforms for its CloudHive Solution.

Hillstone Networks enterprise network security and risk management solutions provide visibility, intelligence and protection to ensure businesses can quickly see, understand and act against cyber threats.

 

Stop Lateral Attacks Between VMs

Hillstone CloudHive provides micro-segmentation to secure each virtual machine (VM) in the cloud. It provides comprehensive visibility of East-West traffic and provides complete protection to stop lateral attacks between VMs. In addition, the CloudHive security service can scale easily to meet demand without business interruption.

Play Video

Learn More About Hillstone Networks

Link Balancers

Products

Link Balancing

For seamless and transparent integration.

PRODUCT OVERVIEW

Networks have become more complex as user habits and expectations change. New applications operating in real-time like unified communications (UC) and video streaming are competing for scarce network resources. Leverage simultaneous ISPs to benefit from seamless failover, increased throughput, link aggregation and smarter path selection for enhanced network performance and maximum uptime.

Martello’s Link Balancers are Layer-2 devices and are typically deployed outside of the firewall for a seamless and transparent integration (bump-in-the-wire). The company’s link balancing solutions include the innovative LBX and VLBX families. All Link Balancers are designed to proactively manage bandwidth from multiple ISP or private links, in an active-active configuration, and can be deployed via Zero-Touch Provisioning.

ACTIVE-ACTIVE DEPLOYMENT

Should an ISP link become unavailable, one or more links will handle the traffic until the troubled link returns to normal.

OUTBOUND TRAFFIC BALANCING

The link balancer will be able to distribute traffic leaving the organization across available links based on organizational preferences.

 

INBOUND TRAFFIC BALANCING

Through DNS (Domain Name Service) interception, a link balancer will be able to distribute incoming traffic across all selected links.
Common examples include roaming VPN clients, webmail access, transactional applications and email retrieval by remote users.

UC-AWARE TRAFFIC BALANCING

Through Martello’s inspection tools, our link balancing devices can steer traffic across multiple ISPs based on UC relevant metrics such as jitter, packet loss, and RTT, and calculate MOS Scores on available paths to maximize Voice Quality at all times.

How do Martello Link Balancers Work?

LBX and VLBX devices allow the use of many routed links simultaneously and support any kind of routed link or speed. Their deployment requires no change to standard router configurations. Martello Link Balancers allow balancing for both incoming and outgoing traffic, usually on a per session basis (source IP, destination IP, source port, destination port, and protocol).

Multiple balancing rules are configured with different algorithms and link selection so the network administrator can have control over network link selection and usage (traffic segmentation). The best link for a given task is identified, and the traffic is directed accordingly, optimizing the available bandwidth and creating a smarter network.

Benefits of Martello Link Balancing Solutions

The use of multiple ISP links enables maximum uptime for connectivity, therefore ensuring the organization is able to conduct online activities normally even if one or more ISPs are not available, as long as one remains. This minimizes the risks of losing sales during outages. Key services such as web surfing, VPN access, and voice traffic will remain available and ensure normal operations.

By preventing downtime, productivity is maintained and employees operate normally even during link failures and outages. The same can be said of servers and services, ensuring all transactions are able to be completed.

Aggregating multiple links onto the same Link Balancer gives the organization the benefit of increased throughput for both upload and download activities.

When Internet access is functioning normally, even when one or more ISPs are not available, users will not contact the helpdesk for assistance and will most likely not try to troubleshoot their equipment themselves.

Prevent Downtime from the Data Center to the End User.

Play Video

How can you ensure that your network will be up to the task?

Cloud and SDN

ELFIQ SD-WAN

Software Defined Networking

Agile, fast, and secure SD-WAN for your digital enterpeise. 

PRODUCT OVERVIEW

Riverbed SteelConnect EX is a powerful enterprise SD-WAN solution available today, that integrates best-in-class routing, application acceleration, network visibility, and security services – a flexible and complete WAN Edge platform that gives you what you need to modernize your network and propel your business in the digital age.

Extend the value of SD-WAN with complete digital networking solution to deliver apps at the fastest speeds to any user, anywhere, and gain new levels of business agility. Do you want to learn more about SD-WAN technology? Visit What is SD-WAN FAQ page.

Imagine what you can achieve with SteelConnect EX.

Agility

Quickly respond to the needs of your business with application-defined, business intent-based policies that are centrally managed and applied network-wide across all remote enterprise locations, including zero-touch provisioning and rapid change management. Utilize comprehensive routing and application-aware path control to easily manage your global network.

Speed

Deliver superior application performance to your business with industry-leading application optimization and end-to-end unified visibility with comprehensive network performance monitoring (NPM). Combing with SaaS acceleration, improve SaaS performance up to 33x by mitigating latency and reducing the bandwidth of up to 99% for leading enterprise SaaS applications, including Microsoft Office 365, Salesforce, ServiceNow, Box and more.

 

Cost-Effective

Maximize the use of redundant and lower-cost connectivity options with zero-touch provisioning and centralized management to reduce the cost of deploying and maintaining hybrid WAN networks (MPLS and Internet) and hybrid architectures. Incrementally add new services without having to deploy all services at once future-proofing your WAN edge and reducing appliance sprawl at branches.

Security

Choose the security architecture that best meets your needs. Backhaul the SaaS and Cloud traffic to the data center to centrally inspect the traffic or enable direct branch-to-Internet breakouts to deliver superior user experience for SaaS and cloud applications. With advanced security and application acceleration integrated with SD-WAN, application performance and security are no longer a trade-off.

Technical Specifications

SteelConnect EX Small Branch Mid-Size Branch Large Branch
Model EX385 EX485 EX685 EX580 EX780 EX3080
Profile Desktop Rack Mount: 1U
CPU Cores 2 4 8 4 6 8
uCPE Capable No No Yes No Yes Yes
WAN Optimization Capable No No No No Yes Yes
Power [Watts] (Typical) External AC PSU with additional PSU for PoE NIC (110 to 240V, 50 to 60 Hz) 37 60 70
Temperature 0 to 35 °C / 32 to 95°F (Operating) -20 to 70°C / -4 to 158°F (Storage) 0 to 45°C / 32 to 113°F (Operating) -40 to 65°C / -40 to 149°F (Storage) 10 to 35°C / 50 to 95°F (Operating) -40 to 65°C / -40 to 149°F (Storage)
System Dimensions (LxWxH) 8.75 x 13.25 x 1.75 in 222.2 x 336.5 x 44.5 mm 12.25 x 13.75 x 1.73 in 311.15 x 349.25 x 44 mm 15.25 x 17.24 x 1.73 in 387.35 x 483 x 44mm
Weight (Without Packaging) 5.84 lbs 2.65 kg 6 lbs 2.7 kg 27 lbs 12.25 kg

SteelConnect EX Solution Components

Get the power you need to build a truly revolutionary SD-WAN.

Play Video

Request demo today!

Application Delivery Controllers

KEMP LoadMaster

Application Delivery Controllers

Unmatched Load Balancer Value

PRODUCT OVERVIEW

With over 30,000 worldwide deployments and offices in America, Europe, Asia and South America, KEMP Technologies is the industry leader in advanced Layer 2 – 7 Application Delivery Controllers (ADC) and application-centric load balancing.

Since 2000, KEMP has been a consistent leader in innovation with a number of industry firsts, including high performance ADC appliance virtualization, application-centric SDN and NFV integration, innovative pricing and licensing models and true platform ubiquity that can scale to support enterprises of every size and workload requirement.

Advanced Layer 4-7 Load Balancing

Optimized application templates, intelligent content switching logic and a range of application-aware traffic steering methods ensure that client requests are always sent to the best possible target and consistent application experience is maintained.

Global Multi-Site Load Balancing

Global Server Load Balancing (GSLB) enables multi-data center and multi-cloud resilience by leveraging service resource awareness and DNS to steer traffic across geographically distributed pools based on defined business logic.

 

Defense-in-Depth Security

With the load balancer most commonly being the network device deployed closest to the application, it’s a critical part of a well-rounded strategy to co-locate key security services to serve as a last line of defense.

Comprehensive Centralized Management

To maintain optimal application experience and availability, tools that provide administrators with total single pane of glass control are critical. The Kemp 360 suite complements LoadMaster load balancers by enabling proactive monitoring, analytics, reporting and configuration management.

The Kemp LoadMaster Application Delivery Controller (ADC) hardware offers the scalability, feature depth and security required to enable resilient delivery of a wide range of application workloads for organizations of all sizes and capabilities.

LM-X1
LM-X3
LM-X15
LM-X25
LM-X40
LM-X40M
Balancer Throughput License
1 Gbps
3.4 Gbps
15 Gbps
25 Gbps
40 Gbps
40 Gbps
SSL TPS License
1,000
1,700
12,000
20,000
35,000
35,000
Get Quote
Get Quote
Get Quote
Get Quote
Get Quote
Get Quote

Support Subscription Options

Standard Support

L4-7 application delivery for high availability and optimization of applications

10x5 Support
Software Updates
Security Patches
Kemp 360 Vision (optional)

Enterprise Support

Enhanced application security and management with advanced issue detection and escalation services

Standard Features
Edge Security Pack
Intrusion Prevention
24x7 Support
Kemp 360 Vision
Kemp 360 Central

Enterprise Plus Support

Advanced security, management, and application availability for enterprise environment

All Enterprise Features
Web Application Firewall
Geographic Server Load Balancing
Daily rule updates for WAF
Daily IP reputation updates for GSLB
Floating License

Every LoadMaster includes the core set of features that address the demands of Application Delivery and ensure service resilience with capabilities such as high availability and simplified administration with easy to use application templates.

Play Video

Start powering your always-on application experience today.