Strona producenta

hillstonelogo

Dokumenty produktowe

Ulotka

Dokumenty techniczne

E-Series:

  E1000

  E2000

  E3000

  E5000

  E6000

 

 

Hillstone E Series next-generation firewalls provide visibility and control of web-based application traffic regardless of port, protocol or IP address. Policies can be defined that guarantee bandwidth to mission-critical applications while restricting or blocking inappropriate or malicious applications. Administrators can control access to applications (and application features) based on users and/or user-groups regardless of IP address, location or device. Hillstone E Series firewalls incorporate comprehensive network security and advanced firewall features. They provide superior price performance, better energy efficiency, and a smaller size compared to competing products

E-series

Granular Application Control

Hillstone E Series firewalls provide granular application control. Administrators can build policies that allow specific users or user-groups to access selected applications. (Allow Marketing to access Facebook). It is even possible to limit access to certain features within an application. (Allow Marketing to access MSN IM but Not file sharing). Policies can also be defined that block or limit access to applications. For example, certain games may be blocked during work hours but allowed after work hours. Alternatively, some applications may be allowed during work hours but with limited bandwidth.

Proactive Threat Protection            

Hillstone E Series firewalls provide real-time protection for application and network attacks including viruses, spyware, worms, botnets, ARP spoofing, DoS/DDoS, Trojans, buffer overflows, and SQL injections. It incorporates a unified malware detection engine that shares packet details with multiple security defenses (IPS, URL filtering, and Anti-Virus), which significantly reduces latency.

Visibility and Control

Hillstone E Series provides visibility and control of network traffic. An intuitive user interface displays all applications traversing the network along with application categories and bandwidth. An administrator can quickly choose an application and see all the users who are accessing that application along with bandwidth consumption. If a particular user is of interest the administrator can see all the applications that user is using - now and in the past. Inappropriate applications can be blocked or limited by bandwidth or time of day. Multiple reports show top applications, top users, top URLs, top URL categories, top threats, etc.

 

Partnerzy

logo-array_networks
logo-backbox
logo-bradford
logo-codesealer
logo-cygilant
logo-fdxtended
logo-firemon
logo-greenbone
logo-hillstone
logo-logpoint
logo-niksun
logo-positive_technology
logo-unitrends
logo_cynet
logo_sealpath