Products by solution

Our solutions

Mobile Security (MDM)

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Mobile Security (MDM)".

Abnormal Behavior Detection

 

Hillstone’s Abnormal Behavior engine continuously monitors the network to learn what normal network traffic looks like for that particular day, time, and month; providing alerts when network activity exceeds calculated thresholds. It uses a 50+ dimensional array to calculate normal network traffic from layer L4-L7, called “behavior modeling.”

 

In addition, it has been trained with real hacking tools to ensure that it will readily recognize malicious activity. These techniques limit false positives and provide the user with multiple opportunities to stop an attack.

 

The menu on the left shows the products from the portfolio corresponding with the search keyword " Abnormal Behavior Detection".

Next Generation Firewall

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Next Generation Firewall".

Advanced Threat Detection

 

Advanced Threat Detection makes it possible to detect malware characterized by advanced ways to dodge or hide network security and new malware that has not previously been identified.

 

Advanced Threat Detection plays a crucial role in protecting data against advanced and persistent malware attacks. When Advanced Threat Detection solutions are integrated into a company's network security, they provide an additional critical source of information about threats to provide protection against zero-day attacks.

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Advanced Threat Detection ".

2-factor authentication

 

 

Two factor authentication (also called Multi Factor Authentication) is an extra step during login (authentication). 2-factor authentication is used on top of the normal authentication during the authentication process in applications. Usually this is no more than a username and / or email address with the corresponding password.

 

Two factor authentication requires two or more authentication tools (factors), these tools/factors are:

• Something the user knows (eg a password or a PIN code)
• Something the user has (eg a token or a mobile phone)
• Something that the user is (eg a fingerprint or  an iris scan)

 

By using two or more factors, the application would be better protected against malicious threats/attacks, such as hackers. The main focus is on "something the user has" because most applications use this.

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "2-factor authentication".

 

Data Center Firewall

The menu on the left shows the products from the portfolio corresponding with the search keyword "Datacenter Firewall ".

Web Filter

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Web Filter".

Micro Segmentation

The menu on the left shows the products from the portfolio corresponding with the search keyword "Micro Segmentation ".

E-mail Security

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "E-mail Security".

SSL Offloading

The menu on the left shows the products from the portfolio corresponding with the search keyword "SSL offloading ".

Intrusion Prevention

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Intrusion Prevention".

Intelligent Firewall

The menu on the left shows the products from the portfolio corresponding with the search keyword "Intelligent Firewall ".

Encryption

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Encryption".

Internal East-West Traffic Filter

The menu on the left shows the products from the portfolio corresponding with the search keyword "Internal East-West Traffic Filter".

Secure File Transfer

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Secure File Transfer".

DNS Protection

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "DNS Protection".

Endpoint Protection

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Endpoint Protection".

Webroot Security Awareness Training

The menu on the left shows the products from the portfolio corresponding with the search keyword "Webroot Security Awareness Training".

Network Protection

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Network Protection".

Server Protection

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Server Protection".

DDoS Protection

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "DDoS Protection".

Secure Wireless

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Secure Wireless".

Application Filtering

 

An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls that do not meet the configured policy of the firewall. The application firewall is typically built to control all network traffic on any OSI layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall, which is - without additional software - unable to control network traffic regarding a specific application.

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Application Filtering".

 

Webserver Protection / Reverse Proxy

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Webserver Protection / Reverse Proxy".

Quality of Service

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Intrusion Prevention".

 

Antivirus

 

Antivirus solutions protect against threats via e-mail, files, URLs, advertisements, apps and more.

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Antivirus".

 

Breach Detection System

 

The menu on the left shows the products from the portfolio corresponding with the search keyword "Breach Detection System".