Smart protection and full network visibility
from the perimeter to the cloud
Our managed perimeter security solution protects enterprise networks against internal and external threats through a comprehensive, multi-layered approach. Threat Management is designed to secure your most critical IT components from the network edge, including traffic, applications, users and devices.
Increased visibility and network control
Detailed monitoring of traffic, users and applications with automated monthly reports and centralized analysis.
Reduced risk of attacks and operational losses
Perimeter protection and advanced threat detection based on policies tailored to your business.
Secure remote access
Encrypted SSL and VPN connections for mobile users or remote branch offices, without compromising the integrity of the environment.
Keep your network protected
against internal and external threats
Perimeter firewall
Customized access and traffic rules with network level inspection (layers 3 and 4).
Web and DNS filtering
Granular control of access to websites and domains, according to corporate and regulatory policies.
Intrusion Prevention System (IPS)
Heuristic analysis and blocking of attack patterns at the application level.
Site-to-Site and individual VPNs (IPSec and SSL)
Encrypted connections between branch offices or remote user access without additional software.
Antivirus and Antispam
Inspection of common protocols (SMTP, FTP, HTTP) and e-mail to avoid threats and inbox overload.
Outbound Load Balancing
Optimization of the use of Internet links through automatic balancing.
Active Directory/LDAP integration
Centralized management of authentication and user policies.
Cloud Security Analytics Portal
View security events, applications, users and threats from a single dashboard.
Simplified security operation
Delegated administration to experts, automatic updates and continuous technical support.
Optimized connectivity and continuity
Outbound traffic balancing, integration with corporate directories and link redundancy.