NETWORK

Continent 4

Enterprise Firewall

New opportunities of the "Continent" 4th generation

Our holistic approach to network
security is the answer

content4_text

KEY FEATURES

Security through visibility

Powerful DPI engine allows you to Identify more than 2600 applications Including Instant messaging, social media, filesharing and enterprise applications.

Allow the ones you need and block the rest.

AI-based attack protection

Signature-less Intrusion detection system allows you to catch adversaries inside your network. Evasion resistant technology constantly monitors network and highlights suspicious activity.

Advanced encryption technologies      

Highly sophisticated network encryption technologies provide secure connectivity between HQ and branches. FPGA based encryption module provides up to 20 Gigabits per second low latency encryption performance.

USE CASES

Distributed network perimeter protection

  • All-in-one protection against internet threats
  • Secure connectivity between enterprise branches
  • Flexible monitoring

Solution

  • Centralized management
    • Device settings
    • Firewall Policy
    • VPN settings
    • IPS policy
  • Granular Identity based policy
    • LDAP integration
    • Captive portal
  • Flexible web- monitoring interface
  • Application control engine (2600 applications)
  • Malicious URL blocking
  • Network behavior anomaly detection
  • NAT support
  • Dynamic routing

Results

  • Cost-effective network protection
  • Optimized network security management and monitoring
  • Proactive threat protection

Internal network segmentation

  • Ultra-high performance
  • Performance doesn’t depend on rule base size

Solution

  • Automated ‘Waterfall’ to binary tree rule translation
  • High packet-per-second rate
  • Intel DPDK framework implementation
  • NAT support
  • Routing support

Results

  • Cost-effective network protection
  • Reduced risks of horizontal hacker propagation

Intrusion detection and prevention

  • All-in-one protection against internet threats
  • Open rule base
  • Protection doesn’t affect network topology

Solution

  • Flexible signature profile settings
    • Layer 3 IPS (included in UTM)
    • Layer 2 IPS
  • Granular IPS profile enforcement
  • Network behavior anomaly detection
    • Signature-less protection
    • Zero performance impact
  • Open signature base
  • Performance impact optimized signatures

Results

  • Sophisticated threats detection
  • Advanced targeted attacks detection

MODEL RANGE

Segment Key properties Appliances
Branch Office
Deployment: Branch or Small Office
Form Factor: Desktop
Interfaces: 1 Gb
FW Throughput: 300 Mbps to 950 Mbps
IPC-10, IPC-25, IPC-50
Enterprise
Deployment: Enterprise network perimeter
Form Factor: 1U
Interfaces: 1 GbE, 1G SFP
FW Throughput: 1 Gbps to 7 Gbps
IPC-100, IPC-500, IPC-500F, IPC-600, IPC-800F
Datacenter
Deployment: Enterprise network perimeter, internal firewall
Form Factor: 1U
Interfaces: 1 GbE, 1G SFP, 10G SFP+
FW Throughput: 16 Gbps Mbps to 49 Gbps
Special features: Hardware VPN accelerator
IPC-1000, IPC-3000F, IPC-3000FC
Large datacenter
Deployment: Internal firewall
Form Factor: 1U
Interfaces: 1 GbE, 1G SFP, 10G SFP+
FW Throughput: 80 Gbps
Special features: Line rate performance, performance doesn’t degrade with high rule count
IPC-1000NF2, IPC-3000NF2