Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Streamline and consolidate your firewall administration and intrusion prevention systems. With enhanced visibility across dynamic and global networks, you can effectively oversee contemporary applications and respond to malware threats in real-time. Seamlessly transition between the management of numerous firewalls, application control, and the prevention of intrusion attempts and malware proliferation. Develop a comprehensive policy and implement its enforcement across various security measures within your network. Benefit from cohesive oversight and governance over firewalls, applications, intrusion prevention systems, as well as protection against files and malware. Efficiently manage your firewalls through our on-premises hardware or from any virtual setting you prefer. You can also deploy the same management solution on your public cloud infrastructure or elevate productivity even further with our cloud-based offering. Quickly identify the most advanced threats across all attack vectors and prioritize them by their potential impact, ensuring swifter responses to incidents. This holistic approach allows for a more robust defense against evolving cyber threats.
Description
The discrimiNAT provides a solution for the inability to define hostnames or fully qualified domain names (FQDNs) within Google Cloud Firewall Rules and AWS Security Groups, enabling effective scalable egress filtering. By employing a Deep Packet Inspection engine, it monitors and blocks traffic without decryption, functioning as a high-availability NAT Instance at the egress point of your VPC network. We have designed the setup for this firewall to be incredibly user-friendly; you simply need to list the permitted destination FQDNs in the outbound rules of your applications, and the firewall manages everything else seamlessly. For a clearer understanding of its simplicity, check out the brief video demonstrations available. Our solution supports everything from complete multi-zone network setups that can be deployed with a single click, equipped with sensible defaults, to customizable instance deployments, allowing users to tailor their networking configurations as needed. Additionally, we offer a comprehensive collection of templates ready for immediate use in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud, ensuring that users can easily get started with powerful and efficient security measures.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
AWS CloudFormation
Azure Marketplace
Cisco Secure Workload
Cisco XDR
Datadog
Google Cloud Platform
Microsoft Azure
Oracle Cloud Marketplace
Integrations
Amazon Web Services (AWS)
AWS CloudFormation
Azure Marketplace
Cisco Secure Workload
Cisco XDR
Datadog
Google Cloud Platform
Microsoft Azure
Oracle Cloud Marketplace
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cisco
Founded
1984
Country
United States
Website
www.cisco.com/site/us/en/products/security/firewalls/firewall-management-center/index.html
Vendor Details
Company Name
Chaser Systems
Country
United Kingdom
Website
chasersystems.com/discrimiNAT/
Product Features
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Product Features
Firewall
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption