UC-Wireless Integrated Wi-Fi and Network Security
The products we use in conjunction with Ruckus manages the security and the connection of the Wi-Fi to the Internet and is a single solution providing UTM (Unified Threat Management) against viruses and spam into the entire network, Integrated VPN and more.
Why Next Generation Security?
Our network security appliances, available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. They ensure high levels of network security, network connectivity, continuous availability and secure remote access with controlled network access to road warriors, telecommuters, partners, customers.
With granular controls and advanced networking features, these network security appliances (UTMs and Next Generation Firewalls) offer enterprise-class security and high flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakage.
Shift from Firewall to UTM/NGFW security
These solution which include a firewall are tightly integrated with features like Application Visibility & Control, VPN (IPSec & SSL VPN), Intrusion Prevention System, Web Filtering, Bandwidth Management, Anti-Virus & Anti-Spyware, Anti-Spam, and Multiple Link Management to provide unified security.
Layer 1 to Human Layer 8 Firewall
The Firewalls implements policies based on the Physical Layer 1 to Application Layer 7 and Human Layer 8 with User Identity in addition to source, destination zone, IP address and application. It enables organizations to control access to network resources based on the user identity, work profile and application access requirement of external users like customers and partners, internal LAN users and employees outside the perimeter like road warriors, telecommuters. It also offers user identity-based security in dynamic Wi-Fi, DHCP and shared endpoint environments.
Offering VPNC-certified IPSec and SSL VPN over the network security appliances, ensuring easy-to-manage secure remote access with high business flexibility while lowering the capital and operating expense involved in deploying dedicated VPN appliances.
Advanced Intrusion Prevention System (IPS) carrying thousands of signatures applicable with human and application layer policies to automatically detect and block intrusions, IM and P2P exploits, backdoor attacks and other malware. Our solution’s IPS carries HTTP proxy signatures and custom signature capability, offering customized protection to meet the unique security requirements of each organization.
Advanced Network Security
They offer advanced network security features to deliver business continuity, faster uptimes, higher network throughput, rapid network growth, meeting the security and regulatory compliance requirements through the following capabilities –
- High Availability with stateful failover
- Dynamic routing
- Multiple VLAN zones to create work-profile based groups across distributed locations
- Virtual host capability, enabling secure hosting of services inside the LAN and DMZ
- Centralized management and logging-reporting
Layer 8 Technology
Security built around the user’s identity – Layer 8 Technology
Current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. An organization’s overall security is only as strong as its weakest link – the user.
In order to address the concerns of gaining visibility and controls on user activity in the network, the UTM’s Layer 8 technology over its network security appliances (UTM appliances and Next Generation Firewalls) has been derived out of the need for a more robust network security system which can include a user’s human identity as part of the firewall rule matching criteria.
By definition, Layer 8 Technology over its network security appliances treat user identity the 8th layer or the "human layer" in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username.
- Identification of attackers/victims with username
- Instant visibility for administrators into source of attacks
- Controlling who is doing what in the network
- Allowing creation of identity-based policies
- Reporting to track identity-based usage, problems, intrusions and so forth.
Integrated security over single network security appliances (UTM, NGFW)
The Layer 8 technology penetrates through each and every security module of the security appliances. All security features can be centrally configured and managed from a single firewall page with complete ease. Layer 8 binds these security features to create a single, consolidated security unit and enables the administrator to change security policies dynamically while accounting for user movement – joiner, leaver, rise in hierarchy etc.
Adding Speed to security
Due to the lack of granular identity features, IT teams often waste time in knowing source of attacks and attackers in case of a security incident. Since Layer 8 offers instant visibility into source of attacks while identifying victims/attackers by username, which allows proactive remediation of security incidents. This adds speed to security.
Security in Wi-Fi environments
We secure organizations in dynamic Wi-Fi environments where it’s not easy to trace users by IP addresses alone. It offers strong user authentication, Internet access controls and reports with identity-based approach and offers separate Guest and Employee network access.
Our content and application filtering feature manages indiscriminate Internet surfing by users through custom policy setting for users and groups, thereby setting access limitations based on time duration and predefined blocked sites across many categories.
Our network security appliances also offer a user, time and role-based bandwidth management approach which prevents users from consuming huge amounts of bandwidth for non-productive surfing and downloads. Instant Messaging Controls allow administrators to control who can chat with whom over text chat, webcam, file transfer.
Logging and Reporting
Layer 8 identity-based reporting, pinpoints precise network activity for each and every user. Its dashboard shows all network attacks on a single screen with third level drill-down reports (100s of reports) for investigating the attacks, and the users behind them.
Through Layer 8 identification and controls, the network security appliances enable enterprises to comply with regulatory compliance norms such as HIPAA, CIPA, PCI-DSS, GLBA, etc.