What We Do

Stateful inspection and port blocking are useless in today’s landscape.

Networks have become more vulnerable because of fundamental shifts in the application landscape, user behavior, cybersecurity dynamics, and infrastructure. SaaS, Web 2.0, social media, and cloud-based applications are everywhere. Mobile devices, cloud, and virtualization are fundamentally changing your network architecture. The way your users consume and your company manages IT has made you more and more susceptible to security breaches and compromised data.

Legacy firewalls and UTMs are incapable of enabling the next generation of applications, users, and infrastructures. That's because they classify traffic based only on ports and protocols. For example, traditional products identify most of your web traffic as simply HTTP coming through port 80, with no information on the specific applications associated with that port and protocol. But this problem is not limited to port 80.

These applications are increasingly using encrypted SSL tunnels on port 443, and use clever evasive tactics to disguise themselves or use port-hopping to find any entry point through your firewall. Legacy firewalls and UTMs cannot safely enable these applications. At best, they can attempt to prevent the application from entering the network, which stifles your business and restricts you from benefitting from innovation.

 

Time for a fundamentally new approach to network security: a next-generation firewall that safely enables applications – and your business.

We offer you real innovation in the firewall, enabling the unprecedented enablement of applications and control over content – by user, not just IP address – at up to 20Gbps with no performance degradation. Based on our patent-pending App-ID™ technology, our next-generation firewall enables applications – regardless of port, protocol, evasive tactic, or SSL encryption – and scans content to stop targeted threats and prevent data leakage. For the first time, you can safely enable the use of applications, maintain complete visibility and control, and significantly reduce your total cost of ownership through network security simplification.

 

Unique capabilities available only in our next-generation firewall:

The only firewall to classify traffic based on the accurate identification of the application, not just port/protocol information.

The only firewall to identify, control, and inspect your SSL encrypted traffic and applications.

The only firewall with real-time (line-rate, low-latency) content scanning to protect you against viruses, spyware, data leakage, and application vulnerabilities based on a stream-based threat prevention engine.

The only firewall to provide graphical visualization of applications on your network with detailed user, group, and network-level data categorized by sessions, bytes, ports, threats, and time.

The only firewall with line-rate, low-latency performance for all of your services, even under load.

The only firewall capable of delivering a logical perimeter for your mobile users.

The only firewall to identify unknown malicious files, often used in targeted attacks, by directly and automatically executing them in a virtual cloud-based environment.