AZ Solutions

Security

What a firewall is and why is it necessary?

So for those of you who feel a little unsure – below is a brief overview of why you might need a firewall. If your PC is connected to the Internet, you are a potential target to an array of cyber threats, such as hackers, key loggers, and Trojans that attack through unpatched security holes.

Why would you use a firewall?

Firewalls can be implemented as both hardware and software, or a combination of both. Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.

What a firewall can protect against?

Other firewalls provide less strict protections, and block services that are known to be problems. Generally, firewalls are configured to protect against unauthenticated interactive logins from the “outside” world. This, more than anything, helps prevent vandals from logging into machines on your network.

ESET makes the only product ever to win 100 VB100

Virus Bulletin, an independent testing organization, presented its first Virus Bulletin Award (VB100) in 1998 and to this day is considered to be the most renowned accolade in the industry. With an unbroken record over 18 consecutive years, no other security product can claim to be the top performer by this independent testing and certification body.

Business Solutions

ESET has a full range of business solutions covering endpoint protection, and mobile, file, mail and gateway security – plus an all-new central management console.

Two-Factor Authentication

Ultra-strong two-factor authentication. Our solution uses no extra hardware – keeping costs low and users happy.

Data Encryption

Keep your company and customer data secured using our state-of-the-art encryption solutions.

Unified Threat Management (UTM)

This involves an approach to information security whereby a single hardware- or software-installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security-related function. UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors.

UTM appliances have quickly gained in popularity, partly because the all-in-one approach simplifies installation, configuration and maintenance. Such a setup saves time, money and people when compared to the management of multiple security systems. Instead of having several single-function appliances, all needing individual familiarity, attention and support, network administrators can centrally administer their security defences from one box.

UTM Features

Network Firewall

Intrusion Detection

Intrusion Prevention

Gateway Anti-Virus

Application Layer (Layer 7) Firewall and control

Deep packet inspection

Web Proxy & content filtering

Data Loss Prevention (DLP)

Virtual Private Network (VPN)

Network Tarpit

Security Information and Event Management (SIEM)