Network security is a prime concern to every business in the digital
world. It includes the privacy and integrity of your data, as well as your
ability to choose what you receive and what you don't. It bolts your doors
to the uninvited and kicks butt in the yard before they get in.
That's what you need. Big, bad, digital guard dogs. On round the clock patrol.
We only work with the best. We ensure the highest level of security and
privacy. Cyber creeps are cunning and adaptable, but you can be too.
Call us for a free consultation.
Anti-Spam
Is your organization losing valuable productivity wasting time with
unsolicited spam? Does your organization ever miss valuable email?
AccessEnforcer™ provides an effective and affordable spam
prevention and email management solution. You can now reclaim your
inbox without losing valuable email whether you host your own email
or rely on a third party hosting service. AccessEnforcer provides
each individual their very own personal end-user quarantine to
filter unwanted email. And our easy to use, intuitive web
interface will guide you through the entire process. Even if you
don't host your own email server, AccessEnforcer can filter your
POP3 traffic for time wasting spam. AccessEnforcer seamlessly
integrates with Microsoft's Active Directory to reject illegitimate
email, can delete obvious spam and allows both organizations and end
users to automatically build approved email lists to ensure you
receive all the email you can't afford to lose. AccessEnforcer
delivers period summary email for suspicious email at intervals set
by the administrator The email summary provides users a one click
release feature to expedite deliver of important mail. To safely
view highly suspicious email, each user can access his quarantine
for a "safe preview" of any email without fear of compromising the
security of your network or their computer.
Features Include:
-
SMTP Filtering
-
POP3 Filtering
-
Individual End User Quarantines
-
Quarantine email summaries
-
Quarantine summary scheduling
-
One-click email release from quarantine
-
Personal email address whitelists
-
Global email address whitelists
-
Global email domain whitelists
-
Anti-phishing
-
Real-time URL checking via SURBLs
|
-
Spam tagging
-
Connection management
-
Strict email recipient checking
-
DNS real-time blacklists (RBLs)
-
Custom DNS real-time blacklists
-
DNS real-time whitelists
-
Spam sensitivity adjustment
-
Sender Policy Framework (SPF)
-
Collaborative hash systems
-
Domain reputation
-
Geographic email policies
-
Web Interface
|
Anti-Virus
AccessEnforcer™ is the only solution available that deploys
DyVax™. DyVax takes a radically different approach to anti-virus
filtration - completely eliminating the need for static signatures
by utilizing dynamic filtering techniques. Dynamic filtering means
no window of vulnerability – new viruses and malicious attacks are
prevented before they are even written. Users are secure and
businesses can rest easy knowing that viruses will automatically be
thwarted. DyVax has successfully blocked zero-day worms and viruses
at customer sites, including multiple variants of the Stration Worm,
the Storm Trojan, and the Valentine's Day Bug. In laboratory
testing, DyVax has proven more successful than the leading
commercial and open source antivirus solutions.
DyVax is a proprietary inspection engine that dynamically filters
email traffic, Microsft Office files and executable files to
identify malicious traffic. DyVax serves as a powerful malware
vaccine by proactively shielding the user’s networks, servers, and
workstations from malicious threats and offering the industry’s
first true and unparalleled, zero-day threat protection. Features
include:
-
DyVaxTM signature-less antivirus engine for zero-day threats
-
Deep scanning of executable attachments
-
Deep scanning of Microsoft Office attachments for zero-day
exploits
Anti-Spyware
AccessEnforcer™ protects the data on your network from spying
eyes by blocking harmful websites and content. Most spyware enters a
network via non-work related web downloads or Peer2Peer connections
made by employees. Now you can safely and effectively restrict web
surfing to strictly business-only content and avoid the costly
downtime associated with web browser related cleanups.
Features include:
-
Spyware Blocking via URL Blocking
-
Spyware Blocking via IPS signatures
Web Filter
AccessEnforcer™ provides a web filtering solution that will
not only fulfill your business needs, but will also fit your budget.
Increase the productivity of your personnel, improve work habits of
your team and enhance the performance of your network by reclaiming
your bandwidth. When you restrict (or even monitor) where employees
surf the web on company time and eliminate non-business applications
from your network you will achieve impressive performance
improvements across the board. Not to mention that you will stop
spyware before it compromises your network and steals valuable
bandwidth, generates costly repair bills and destroy employee
productivity. AccessEnforcer includes a Web Proxy with extensive
features that is designed to give you greater control over web usage
in your organization. By blocking harmful websites and content, you
are protecting the data on your network from spying eyes. Most
spyware enters a network via web downloads. Now you can restrict web
surfing to strictly business content and avoid costly downtime
associated with web browser related cleanups.
Features include::
-
Monitoring mode
-
Enforcement mode
-
Positive enforcement
-
Negative enforcement
-
URL blacklist categories
-
Custom URL blacklists
-
URL whitelists
-
Restrict web surfing to approved URL whitelist
|
-
Extension blocking
-
File Type blocking, including ActiveX
-
Spyware blocking
-
Antivirus scanning
-
Content filtering by categories
(e.g. pornography)
-
Content filtering by keywords
-
Caching for faster downloads
|
Firewall
AccessEnforcer™ employs a stateful deep-packet inspection
firewall to analyze both incoming and outgoing traffic. It examines
multiple layers (layers 3-7) of data traffic at a company's gateway
for all malicious attacks and blocks even the most insidious attacks
(including stealth fragmentation attacks) before they reach the
company's internal network. Prevent Denial-of-Service Attacks,
Distributed Denial-of-Service Attacks, Spoofing, and Scans at the
gateway level.
AccessEnforcer provides the following capabilities:
-
High quality PF firewall
-
Stateful packet inspection
-
SYN Flood DoS protection
-
DDoS protection
|
-
Anti-Fragmentation
-
ICMP blocking
-
Attack reconnaissance blocking
-
IP whitelisting
-
IP blacklisting
|
IPS/IDS
AccessEnforcer™ comes complete with a powerful network
Intrusion Prevention and Intrusion Detection system - using the same
technology currently being utilized by government and military
organizations. Backed by the powerful OpenBSD PF firewall and
Snort®, the AccessEnforcer IPS/IDS is dedicated to stopping
intruders before they compromise your data. Within minutes of
installing AccessEnforcer, our customers report stopping
attacks their older firewall could not even detect.
-
Snort®, the same IDS/IPS engine used
by government and military organizations
-
Over 4,000 high-quality signatures
-
IP whitelisting
-
IP blacklisting
-
Dynamic Blacklisting
-
Rule management and exceptions
-
Dynamic blacklisting of offenders
-
Denial of service protection
-
Bot
|
-
Exploits
-
Malware
-
Adware
-
Downloader
-
Spyware
-
Trojans
-
Cross-site scripting attempts VoIP attacks
-
Extensive Logging of Attacks
-
Rule and Anomaly Based
-
Rule Management and Exceptions
|
Instant Message Management
AccessEnforcer™ gives you the ability to block all incoming
and outgoing Instant Messages on your network. You can block all or
one of the following with the click of a checkbox. It's that simple.
|
-
Yahoo
-
Google Talk
-
Internet Relay Chat (IRC)
|
VPN
It used to take hours to setup a VPN. It was a painful process with
many configurations and undocumented protocols, not anymore.
AccessEnforcer™ makes setting up a dynamic or static key VPN a
breeze. Our extremely easy to use web interface even has a built in
VPN wizard to make setup as simple as possible. Why spend hours
setting up a secure connection when you can do it in just a minutes?
-
IPSec c
-
Gateway-to-gateway
-
Gateway-to-host
-
AES / 3DES / Blowfish encryption
-
SHA1, SHA256, SHA384, SHA512,
MD5 authentication
|
-
Static Keying
-
Automatic Keying (Diffie Hellman
Exchange)
-
IPS enforcement within VPN tunnels
-
Friendly IPsec wizard
-
PPTP passthrough
|
Reporting & Logging
What good is the network data you collect if you can't
easily view it? AccessEnforcer™ makes viewing this data an
easy task. Our easy to use web interface makes it easy to query old
network attacks or blocked websites.
Maybe you want to see the past 20 blocked websites, or all of the
network alerts with a specific source IP address, and then whitelist
that IP. No problem. AccessEnforcer makes this a painless operation.
Maybe you want more up to date realtime information like all of the
current connections in and out of your network. With a simple click
you can view all of this data in real time.
-
Firewall and IPS network alerts
-
Live connection monitoring g
-
Traffic usage graphs
-
Email quarantine reports
|
-
Web traffic reports
-
Daily administrator PDF reports delivered via email
-
No additional hardware required
-
No additional software required
|
Internet Defense Force
AccessEnforcer™ is a scalable foundation for the patent
pending process that Calyptix Security calls its Internet Defense
Force™. The Internet Defense Force leverages the real timedetection
and analysis of distributed network data to provide scalable
Internet security without signatures.
Network Management
AccessEnforcer™ delivers comprehensive and easy to use
comprehensive network management functionality for the small and
medium business. .
Network management features include:
-
Friendly web-based interface
-
Static IP Mapping (1:1 NAT)
-
Port forwarding
-
Static routes
-
Static IP addressing
-
DHCP IP addressing
-
IP aliases
-
Individual subnets (LANs)
-
NAT
|
-
DHCP server for each subnet
-
DNS server for each subnet
-
Fixed MAC-IP address mapping
-
MAC address cloning/spoofing
-
Secure HTTPS remote management
-
Automatic maintenance-free updates
-
Diagnostic tools
-
Highly secure OpenBSD platform
|