Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
Shortage of inhouse IT engineers
High costs of IT personnel
Values
Reduce Costs
Ensure Security and Business Continuity
About Product
Description
Real-Time Threat Intelligence
The Red Piranha threat intelligence network is comprised of an intel feeds that keep us aware of evolving threats, exploits and vulnerabilities in systems around the world. We partner and receive feeds from the OTX (Open Threat Exchange) and OISF (Open Information Security Foundation). Every day we receive immense amounts of data from over 65,000 different member sources in over 140 countries which gathers over 14 million threat indicators daily that gives us unique insight into cyber-crime, exploits, and dangers - all in real-time. We then update our Crystal Eye UTM Platform 4x daily to ensure your network is safeguarded and aware of the exploits before they hit you.
A Layered Approach to Security
Unlike a standard firewall, Crystal Eye UTM takes a layered approach and does not rely on a single method of protection. We use several in combination and back that up with intelligence and real-time alerts from around the world to keep aware of trends and new vulnerabilities. This is the same layered security methodology used by high-end devices costing upwards of $100,000 or more. Crystal Eye UTM is designed to offer the protection of the expensive systems but at a price small-to-medium sized enterprises can afford.
Suitable for Virtual and Hybrid Cloud Networks
The Crystal Eye UTM Platform is built to work on standard, virtual and hybrid networks that utilize cloud platforms. Unlike other UTM products on the marketplace that assume they are placed on the physical network boundary, Crystal Eye is ready to be deployed on all network boundaries, regardless of the infrastructure model used. This flexible approach is critical for MSPs and enterprises using traditional AND cloud-based networks.
The Crystal Eye UTM Dashboard
All of your security and networking policies, alerts, anti-virus related messages, system health messages, CPU, memory load, all critical controls are managed from a single central dashboard making your job much easier and your ability to respond to threats much faster. You can now easily determine details of current threats and identify ongoing issues such as those impacting e-mail or network performance - all from one pane-of-glass.
Features:
- Application Whitelisting
- Core Security Configurations
- Next Generation Firewall
- Integrated Firewall - IPS/IDS
- Application Filters
- DNS Filtering
- Gateway Antivirus
- Gateway Antiphishing
- Interception and Decryption
- Content Filter and Proxies
- Data Loss Prevention (DLP)