Dynamic Address Groups
Multiple tags representing virtual machine attributes, such as IP address and operating system, can be resolved within a Dynamic Address Group, allowing you to easily apply policies to virtual machines, as they are created or travel across the network, without administrative intervention.
IP addresses and port numbers are useful for network devices but tell you nothing about what is on the network. Knowledge of the applications, users and content traversing the network provides an organization with the power to quickly determine the associated risks and quickly respond. Leveraging the rich context provided by our premium firewall, the visualization, analysis and reporting tools, allow an administrator to quickly learn more about network activity and analyze incidents from a current or comparative perspective.
Feature-level control, file blocking by type, and data filtering features allow organizations to implement a range of policies that can help balance the use of personal or non-work related applications with the business and security risks associated with unauthorized file and data transfer.
Take control over the use of encryption over the network and ensure that it is not being used to conceal unwanted activity or dangerous content. Using policy-based decryption and inspection, administrators can ensure that SSL and SSH are being used for business purposes as opposed to propagation of threats or unauthorized data transfer. The WHOA premium cloud-based firewall can ensure that SSL/SSH sessions are inspected in a safe and secure manner.
The increased visibility into applications, users, and content can help simplify the task of determining which applications are traversing the network, who is using them, and the potential security risk. Armed with these data points, administrators can apply secure enablement policies with a range of responses that are more fine-grained than the traditional allow or deny.
A flexible networking architecture that includes dynamic routing, switching, and VPN connectivity enables organizations to deploy the WHOA premium firewall into nearly any networking environment.
Acting as the perfect complement to policy-based application control, is an on-box URL filtering database that provides control over related web activity. By addressing the lack of visibility and control from both the application and web perspective, enterprises are safeguarded from a full spectrum of legal, regulatory, productivity, and resource utilization risks.
Secure site-to-site and remote user connectivity is a critical infrastructure component for nearly any organization. Our premium firewall platform allows organizations to easily communicate in a secure manner between sites using standards-based IPSec VPN connections while remote user communications are protected through a rich set of VPN features.
Secure site-to-site and remote user connectivity is a critical infrastructure component for nearly any organization. With that in mind, the WHOA premium firewall allows organizations to easily communicate in a secure manner between sites using standards-based IPSec VPN connections, while remote user communications are protected through a rich set of VPN features.
In offering our cloud-based firewall options to your business, WHOA will help you decide the optimum setup for your unique business architecture. Regardless of which of our firewalls you select, we will work with you to make sure that you enjoy a secure business atmosphere in which you can work confidently. The customizable features will further enhance your network, and give you the control to manage it for optimum performance and privacy. With the protection of our cloud-based firewall offerings, and the support of our experts during setup and beyond, your network and valuable information will be comprehensively protected.
If you would like more information regarding our Cloud Firewall solutions, please complete our contact form or call us directly at (877) 700 WHOA.