Strona producenta

hillstonelogo

Dokumenty produktowe

Ulotka

Security Solution

Whitepaper

Dokumenty techniczne

E-Series

 

 

Hillstone E Series next-generation firewalls provide visibility and control of web-based application traffic regardless of port, protocol or IP address. Policies can be defined that guarantee bandwidth to mission-critical applications while restricting or blocking inappropriate or malicious applications. Administrators can control access to applications (and application features) based on users and/or user-groups regardless of IP address, location or device. Hillstone E Series firewalls incorporate comprehensive network security and advanced firewall features. They provide superior price performance, better energy efficiency, and a smaller size compared to competing products

E-series

Granular Application Control

Hillstone E Series firewalls provide granular application control. Administrators can build policies that allow specific users or user-groups to access selected applications. (Allow Marketing to access Facebook). It is even possible to limit access to certain features within an application. (Allow Marketing to access MSN IM but Not file sharing). Policies can also be defined that block or limit access to applications. For example, certain games may be blocked during work hours but allowed after work hours. Alternatively, some applications may be allowed during work hours but with limited bandwidth.

Proactive Threat Protection            

Hillstone E Series firewalls provide real-time protection for application and network attacks including viruses, spyware, worms, botnets, ARP spoofing, DoS/DDoS, Trojans, buffer overflows, and SQL injections. It incorporates a unified malware detection engine that shares packet details with multiple security defenses (IPS, URL filtering, and Anti-Virus), which significantly reduces latency.

Visibility and Control

Hillstone E Series provides visibility and control of network traffic. An intuitive user interface displays all applications traversing the network along with application categories and bandwidth. An administrator can quickly choose an application and see all the users who are accessing that application along with bandwidth consumption. If a particular user is of interest the administrator can see all the applications that user is using - now and in the past. Inappropriate applications can be blocked or limited by bandwidth or time of day. Multiple reports show top applications, top users, top URLs, top URL categories, top threats, etc.

 

Partnerzy

logo-array_networks
logo-backbox
logo-bradford
logo-cellopoint
logo-codesealer
logo-cyren
logo-detack
logo-eiq
logo-fdxtended
logo-firemon
logo-greenbone
logo-hillstone
logo-isheriff
logo-logpoint
logo-netskope
logo-niksun
logo-positive_technology
logo-promisec
logo-unitrends
logo-waystream
logo_cynet
logo_sealpath