Firewall and Networking

Outside of computer security, a firewall is simply a wall built to stop the spread of a fire. In terms of computer security, a firewall is a piece of software. This software monitors the network traffic. A firewall has a set of rules which are applied to each packet. The rules decide if a packet can pass, or whether it is discarded. Usually a firewall is placed between a network that is trusted, and one that is less trusted. When a large network needs to be protected, the firewall software often runs on a computer that does nothing else.

Different kinds of Firewalls-

  • Packet filtering Stateful
  • packet inspection
  • Application-layer firewalls

Juniper Networks

 

Juniper Networks is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology.

Juniper Networks originally focused on core routers, which are used by internet service providers (ISPs) to perform IP address lookups and direct internet traffic. Through the acquisition of Unisphere in 2002, the company entered the market for edge routers, which are used by ISPs to route internet traffic to individual consumers. Juniper Networks entered the IT security market with its own JProtect security toolkit in 2003 before acquiring security company NetScreen Technologies the following year. It entered the enterprise segment in the early 2000s, which accounted for one-third of revenues by 2005. As of 2014, Juniper has been focused on developing new software-defined networking products. However, in 2016, the company encountered some controversy for allegedly putting backdoors into its ScreenOS products.

Fortigate Firewall

 

FortiGate consolidated security platforms deliver unmatched performance and protection while simplifying your network. Fortinet offers models to satisfy any deployment requirement from the FortiGate-30 series for small offices to the FortiGate-5000 series for very large enterprises, service providers and carriers. FortiGate platforms combine the FortiOS™ security operating system with FortiASIC processors and latest-generation CPUs to other hardware to provide a comprehensive, high-performance security. Each FortiGate includes the widest range of security and networking functions on the market, including:

  • Firewall, VPN, and Traffic Shaping
  • Intrusion Prevention (IPS)
  • Antivirus/Antispyware/Antimalware
  • Integrated Wireless Controller
  • Application Control
  • IPv6 Support
  • Data Leak Prevention
  • Secure Wi-Fi
  • Web Filtering
  • Antispam
  • VoIP Support
  • Layer 2/3 routing
  • WAN Optimization & Web Caching

FortiGate appliances provide enterprise-class protection against network, content, and application-level threats. Dynamic updates from the FortiGuard Labs global threat research team ensure your systems are protected against the latest threats. FortiGate platforms incorporate sophisticated networking features, such as high availability (active/active, active/passive) for maximum network uptime, and virtual domain (VDOM) capabilities to separate various networks requiring different security policies.

Cyberoam Firewall

 

Cyberoam’s product range offers network security solution (Firewall and UTM appliances), centralized security management (Cyberoam Central Console appliances), centralized visibility (Cyberoam iView ), and Cyberoam NetGenie for home and small office networks.

Cyberoam network security appliances include multiple features like Firewall – VPN (SSL VPN & IPSec), Gateway Anti-Virus, Anti-Spyware & Anti-Spam, Intrusion Prevention System (IPS), Content & Application Filtering, Web Application Firewall, Application Visibility & Control, Bandwidth Management, Multiple Link Management for Load Balancing and Gateway Failover over a single platform.

Cyberoam offers visibility and control over 2000+ key applications. It offers complete visibility on which applications are being accessed within the organization and by which user, irrespective of their ports and protocols. This stops sophisticated application-layer threats right at the network perimeter, ensuring Application Security. Granular controls over applications ensure QoS of critical applications.

Cyberoam UTM’s on-appliance reporting gives details on every type of attack, vector, attacker details, victim details and also graphically represents the general security trends in organization. Cyberoam solutions aid the compliance regulatory needs of organizations.

Cisco ASA Firewall

 

Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive threat defense that stops attacks before they spread through the network.

An ASA is valuable and flexible in that it can be used as a security solution for both small and large networks.

The Cisco ASA 5500 series is Cisco’s follow up of the Cisco PIX 500 series firewall.  However, the ASA is not just a pure hardware firewall. In brief, the Cisco ASA is a  security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive threat defense that stops attacks before they spread through the network. Indeed, Cisco ASA firewall is the whole package, so to speak.

Contact us now and a member of our team will be happy to discuss your project further.