DLA Gateway

All-in one appliances MF ensure comprehensive network protection Munich/Linz security gateway and AS communication gateway, October 21, 2008 the illegally acquired business data business is thriving. VoIP programs RIP vulnerabilities in firewalls. In modern networks, Web 2.0 applications and mobile disk form vulnerabilities. Given the current Internet threats such as malware, spam, phishing and industrial espionage, small and medium-sized businesses need an effective protection of your data to organisations. Under ground_8 (System, Hall B3, booth 328) with its new product line offers this security gateway and AS communication gateway MF.

The comprehensive solutions to protect of the entire infrastructure and E-Mail communication is characterized by numerous new features, with which defy corporate networks of current and future E-threats. The number of Internet threats is growing and they are becoming more sophisticated. The increasing emulation and virtualization of applications makes the tasks of security solutions more demanding. Malware obtained hidden, moving into the corporate networks viruses and co. in seemingly innocuous applications by voice applications or peer-to-peer programs. MF security gateway: protection against malware of the new generation therefore has underground_8 the next generation threat management for the MF develops security gateway. The combination of best-of-breed solutions from Intel, Kaspersky or cyan and specially designed, award-winning security provides protection against known as well as future pests.

The specially hardened, in-house operating system sniper OS with optimized kernel, such as routing, packet filtering and stateful inspection of the basic firewall functionality is used in the appliances. Due to the integrated stealth technology, the appliances are not recognized and offer no attack surface area for attacks. The MF security gateway discovered attacks-based content and hidden malware by DCI (dynamic content inspection), ASMX (anti-spam and malware detection Accelerator), and DLA (dual-layer antivirus), still before they can reach the network. While scanning the content happens in real time, without compromising speed or bandwidth of the network.

Tags: ,

{ Comments are closed! }