Description
GajShield Data Security Firewall Appliance
GajShield GS165nu Data Security Firewall understands data and provide deeper data visibility, and a broader threat surface manageability. The firewall features a context based data security approach which allows for greater control over data transaction and prevents Data Exploitation. GS165nu is ICSA Labs certified and provides state of the art security for enterprises.
GS165nu Data Security Firewall is ICSA Labs Certified supports High Availability with Active-Active and Active-Passive HA. It can also be easily managed using GajShield’s Centralised Firewall Management System.
Features
- Data Security Health
- Understands Data
- Threat Surface Management
- Data Leak Prevention
- On Appliance reporting
- complete visibility
- firewall, Application Filtering, BYOD Policy
- Network behavior analysis, Policy based ISP
- Load Balancing
- Bandwidth Management and more.
- Application Identification Engine
- Advance Contextual Data Classification Engine
- Apply Visibility and Data Aware Policy Identify policy violation and protect against data exploitation
- Network based data leak prevention Prevent data leak on G Suit, Office 365, Popular Social Media, Web etc.
- Protect business critical data
- Scan for Data Leak on all outbound communication Alert on Data Security Policy violation
- Block Password Protected zip and PDF file uploads
- Block file uploads based on File Content, file type and size
- Time scheduling for DLP policies
- Visibility on Information sent as attachments on popular
- Webmail, Blogs, web uploads, SaaS, etc.
- View Content of mail for Gmail, Outlook, Office 365, Rediff,Yahoo etc. Visibility of data transaction over HTTP, HTTPS, SMTP, SMTPS-SSL & Web Chats
- Data Transaction on SMTP mail, popular Web Mail and browser-based SaaS application
- View attachments attached with the mail View webmail draft attachments information
- visibility of evasive applications like P2P and Skype
- application accessed by users
- Identifies Who is accessing, which application,
- Visibility of application usage and data transaction on application Data transfer reporting (By Host, Group & IP Address)
- Log of Data sent through Web Browser based SaaS SMTP mails
- Network Data Transaction logs from HTTP, HTTPS, SMTP, SMTPS-SSL & Web Chats
- Log Data context of the Popular webmail sites such as Gmail,
- Office 365, Yahoo and Rediff mail including To, CC, BCC
Virtual Private Network (VPN) – Secure Connectivity
Benefits :-
- Save from Man in the middle attacks by integrating Strong Authentication with RSA SecureID, VASCO tokens, LDAP, Radius, Active Directory, Pre-shared key, Digital Certificates and Xauth to avoid any kind of intervention in the network and the communication.
- Strong Encryption by using 3DES, AES encryption and Hash Algorithms like MD5, SHA1 and SHA2 for encryption purposes.
- VPN Logs provides the detailed reports of the IPSec VPN tunnel up/down and Active VPN users. These logs can be used to monitor the details such as IP Address, Status of the VPN and the type of VPN by the users who are connected to the VPN.
Multi Wan Management – ISP Load Balancing/Failover
Benefits :-
- ISP Link Redundancy – Failover manages the traffic while providing valuable failover capabilities such as continuously monitors the health of the available internet connections, checks the status of all the internet links, senses the failures in real-time and automatically redirects the traffic to the functioning internet links.
- Service-based ISP load balancing or failover provides granular options to specify the primary internet link and multiple secondary internet links for each different service. For example ISP2 is set as primary for the VPN, incase of failure of ISP2 VPN service will be automatically redirected to secondary ISP that is either ISP1 or ISP3 as per the defined policies.
- Load balances traffic based on weighted round-robin distribution which distributes the traffic throughout multiple internet links and provides the flexibility to utilize the total bandwidth of all the internet links avoiding bandwidth blockages while reducing the cost of unproductive bandwidth usage.
- Integrated reporting and Alerts that contains current, daily, monthly and yearly reports as well as dynamic analysis of ISP usage, what applications are being used through which ISPs and by whom.
- ISP failover and heavy traffic notifications on email keeps administrators informed about the internet link interruptions that demands immediate troubleshooting.
High Availability
Benefits :-
- Stateful Failover empowers a router to keep processing and forwarding firewall session packets without requiring adjustment or reconfiguration of any remote peer in case of an intended or accidental failure occurs.
- Email Alerts to report the existing status of High Availability and modifications in states from Master to Backup or vice versa.
- Configuration Auto Synchronization syncs the entire configuration made on Master or Primary Firewall to Backup or Secondary Firewall.
Contextual Intelligence Engine
Benefits :-
- Complete visibility of the applications and bandwidth used for uploading and downloading along with the Granular Reports of What files have been uploaded and downloaded, By Whom, When and Where it is uploaded or from where it is downloaded and by using Which application.
- Advanced Network Visibility by analyzing the parameters such as Email ID, Sender ID, recipient ID, CC & BCC mentions, Mail Subject, Mail Body, Signature, File Content, downloader, uploader etc. across web traffic and SaaS applications, the GajShield Data Security Firewall determines the safety and legitimacy of communications & transactions and takes necessary actions to prevent data exploitation and mitigates the impact of a zero-day attacks.
Secured Guest Management
Benefits :-
- Guest login portal is the medium used by guests to login to access the Internet. Guests who want to connect their laptop or smartphone with your organization’s internet will immediately be redirected to this portal. This portal can be tailored as per the organization and gives the very first impression of your company to the guest users.
- Create Guest Users Manually or Let them Self-Register through their mobile number. IT Administrators can manually add the guests or group of guests with desired security policies like URL, DLP, Application Filter Policies or can also provide the provision for guests to self-register with his/her mobile number. Once a guest registers then he/she receives a one-time access code / username and password on the mobile phone via SMS and guests can activate the account by using received username & password.
- Guest Administration Portal works as a control centre for IT staff. It provides a detailed reporting system built with intelligence to identify anomalies and misuse of policies.
- Add Guest Users in bulk by uploading a CSV File.
- Delete Multiple Guest Users manually or enable Auto-Delete which deletes users automatically once the validity expires.
- View Guest User Registration and Auto-Delete Logs The use of activation through the mobile number enables traceability of the guest’s activity in the network as the identity of the guest will be automatically validated through the mobile subscription.
- Applying Bandwidth Capping / Queue / Time Quota on guest users saves the unwanted bandwidth utilization and also allows you to route the traffic of guest users through different ISPs so that primary ISP bandwidth can be utilized without any misuse and interruptions.
- Apply BYOD restriction and Limit access to the guest users by configuring the guest network on a distinct port of GajShield Firewall or by providing user credentials through GajShield’s Data Security Firewall via SMS. This credential expires after a pre-configured / pre-defined time.
* Requirements –
- To send credentials i.e. Username and Password through SMS requires integrations with SMS Gateway. The organisation will have to procure the SMS Gateway from favorable service provider. Credentials can be sent via email also.
- GajShield Data Security Firewalls provides preset API parameters for multiple service providers. The service providers that are not mentioned in GajShield API parameters; customers have to obtain and configure it on GajShield Firewalls.
SD-WAN
Benefits :-
- Best-Of-Breed software-driven networking that offers high-performance as well as advanced protection.
- Enhances User Experience, Security & Application Performance by Centralized Control function to securely and intelligently route traffic across the WAN.
- Reduces Costs upto 90% by replacing traditional and expensive private WAN connections.
Centralized Management System (CMS)
The Centralized Management System gives a comprehensive platform for creating and managing security policies, offering real-time visibility, monitoring and alerts. CMS enables network admins to control and manage GajShield Firewalls including network policies,Data Leak Prevention, URL filtering, Application Filtering, Gateway Antivirus, Gateway Antispam, IPS, ISP Failover, Load Balancing and software updates of different locations through a single centralized dashboard.
Benefits :-
- Centralised policy management to manage all aspects of device configuration from a single central console and also allows you to push global policies, view all firewall traffic, and generate reports.
- Quick Deployment GajShield enables organizations to transport GajShield Data Security Firewall appliances to each remote site without configuring them. Once this appliance is plugged into the network, it automatically gets connected to the Centralized Management Server. The server authenticates the remote device within a few seconds and once it gets authenticated then the admin can apply the security policies from CMS which eliminates the need of going on-site.
- Lowers the Cost of Setup and Operation by offering a centralized management system through which multiple firewalls can be configured and managed through a single dashboard. This saves the huge time of IT admin and eliminates the need for admin’s on-site visits which saves the huge cost of an organization at the same time as well as increases productivity.
- Increases ROI by replacing the MPS connections with VPN and broadband internet services to connect multiple locations with each other which lowers the WAN costs by up to 90%.
- Better Performance in terms of speediest application steering and unique application identification performance delivered by GajShield Security Architecture which is backed by multi-core architecture. This also comprises deep secure sockets layer (SSL)/transport layer security (TLS) inspection with the minimum performance degradation.
Multi-Cloud Security
Benefits :-
- Control Collaborative Applications with the ability of strongly analyzing contextual data of web applications and to deploy granular data security policies that enable the organizations restrict such collaborative business applications to commercial use only. This helps the organization to achieve the following things :
* Use of only Corporate Login on Gmail, Rediff Mail, Google Drive, Microsoft One-Dive, Yahoo, Social Media platforms like Facebook etc.
*Preventing to send mail without mentioning the manager in CC.
*Block the Personal ID Use on SaaS applications.
*Control on sending Mails to predefined IDs/Domains only.
*Control of Data Uploads based on file type, content, size and more.
*Stops the data leak from such applications.
*Provides View Mode in which one can access the application or data but will not be able to perform any action.
- Data Leak Prevention of GajShield Data Security Firewall offers an additional security with its Context based DLP Engine which allows an organization to observe data and prevent data leaks. Gajshield’s DLP systems act as enforcers of data security policies here. GajShieldData Leak Prevention solution identifies, monitors and protects the data in motion on your network through deep content inspection and a contextual security analysis of transactions.
- Advanced Threat Protection that serves to protect an organization’s network from zero-day attacks and advanced threats. Artificial Intelligence merged with Advanced Threat Protection provides extreme value into the detection of malicious and suspicious traffic, blocking zero-day attacks and protecting your network from cyber threats. GajShield Firewall also protects the organization from external threats by using Advanced Threat Protection and Intelligent Sandboxing technique.
- Secured Connectivity using high-speed VPN connection provided by the combination of Contextual Intelligence Engine and Security Policies implemented in GajShieldData Security Firewall to connect with Cloud applications and Data centers securely.
- Deep Visibility is the main factor in cyber security and thus having just a summary is not sufficient. GajOS Bulwark provides in-depth reporting for deep visibility throughout the network.
Buy GajShield Firewall online from Firewall Firm’s IT Monteur Store