Cloud Based Firewall

Detect and Block Suspicious Network Traffic

A robust firewall is imperative for any business network as a first line of defense against intrusions and other threats. The North Atlantic Networks Managed Firewall filters your network traffic allowing good traffic and blocking potentially harmful traffic. This cost-effective, managed solution protects against unauthorized users, dangerous protocols, and common network layer attacks with no impact on network performance.

North Atlantic Networks Managed Firewall is available in Basic Firewall for small businesses and branch offices and Advanced Firewall configurations for medium to large businesses. If you already have a firewall onsite, North Atlantic Networks Managed IP Security Suite can work in conjunction with your existing firewall and equipment, giving you additional protection your firewall doesn’t provide.

cloud

Features and Benefits

The North Atlantic Networks Managed Firewall helps organizations safeguard sensitive information assets shared between corporate headquarters, branch offices, telecommuters, customers and partners.

Features include:

  • Deep Packet Inspection
  • Up to 500 firewall policies
  • High performance ASIC-based architecture
  • Comprehensive high level and granular reports for complete visibility into network and application performance

How It Works

The North Atlantic Networks Managed Firewall has an ASIC-based architecture that uses deep packet inspection to stop connection and fragmented attacks. This chip works at wireline speed inspecting both networking information (packet headers) and application information (payloads) to detect and block suspicious traffic.

Based on corporate security policies, the Managed Firewall filters inbound and outbound network traffic by implementing a series of rules that allow or deny traffic to pass through the network. In addition to packet filtering, the firewall tracks the sequence of events during ongoing connections to detect violations of normal processes and protect against floods, port scans, denial of service and other network attacks.