pten

Edge Security aims to prevent unauthorized access and maintain the integrity of information flowing to and from the automation network. To achieve this goal, it is necessary to use a tool and adopt specific policies and procedures.

TI Safe works with an integrated and centralized solution that uses the latest technology to guarantee and monitor the edge security of your company's automation network.

A next-generation firewall is an integrated network platform that combines traditional firewall (address and port control) systems with other filtering features such as deep application packet inspection and advanced persistent threat checking (APTs). They are high performance systems, also used to analyze TLS / SSL encrypted traffic, web browsing content, and offer integration with identity systems such as LDAP, RADIUS and Active Directory, as well as other capabilities.

Figure: Next Generation Firewall Palo Alto

The main characteristics of these systems are:

  • Application classification

Identifies the application, regardless of port, encryption (SSL or SSH) or evasive techniques used.
Uses the application, not the port, as the basis for all your decisions about the secure activation policy: allow, deny, schedule, inspect, and apply traffic formatting.
Categorizes unidentified applications for policy control, forensic threat study, or application signature development.

  • Applying security policies to all users, anywhere

Implements consistent policies for local and remote users using Windows®, Mac® OS X®, Linux®, Android®, or Apple® iOS platforms.

Enables agentless integration with Microsoft® ActiveDirectory® and Terminal Services, LDAP, Novell® eDirectory ™ and Citrix®.

Easily integrate your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information.

  • Prevention of known and unknown threats

Blocks a number of known threats, including exploits, malware and spyware, on all ports, regardless of the common threat evasion tactics employed

It limits the unauthorized transfer of files and sensitive data and securely enables non-work-related web browsing.

It identifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection.

  • Centralized management

Next Generation Firewall systems should contain the possibility of using centralized management systems to deploy policies and manage resources.

Figure: Centralized Management Using the Panorama Console

Copyright © 2007-2018 - IT Safe Information Security - All rights reserved.