utm

UTM

Unified threat management (UTM) greatly improves network security awareness and control. It combines multiple security services and delivers multifunctional protection. With these services network users are protected with several security mechanisms and tools which can be momentarily activated if need be.
UTM functionality includes

  1. Antivirus and antispam,
  2. File filtering,
  3. IPS/IDS.
  4. Vulnerability protection

Application aware routing - Intelligent traffic steering

Regular layer 3 routing mechanisms served well over the decades channeling data traffic towards its destination. Though in these mechanisms not really much has been thought of application and service performance.

The goal was to deliver the traffic back and force. Conceptual shifts of data in use as well as networks that carry the latter have shown that regular destination-based routing mechanisms are not enough anymore to keep the flow consistent hence keeping production smooth. While clouds on the rise and next gen apps ramping up the markets they require change into ways of how to organize the transport, capable of handling this derivative traffic most of the time unpredictable and dynamic.

Software defined networks take regular routing into next level by introducing intelligent application aware routing or traffic steering. Defined in the framework of software defined network paradigm traffic steering is a concept that implements smart mechanisms to recognize and dynamically select the optimal end to end paths for particular traffic to pass in real time, hence greatly responding to the dynamics of next gen networks in a timely manner. It analysis the routes that traffic can take and dynamically adjusts them based on several parameters that are observed rather than focusing just on destination.

Application
smart network

Smart networks

Smart resource management It’s a common pattern in today’s static networks when centralized sites such as regional HUBs, HQs or DCs get congested by incoming traffic from the remote spokes (actually this can be noted at any site). Unregulated bursty and bulky traffic chokes the sites, making them standstill and out of production (similar to DDOS attacks). Another effect is when service provider polices the traffic, forcing contractual restrictions. Hence traffic gets dropped and lost negatively impacting the business. This is usually noted in a standard HUB and spoke data networks widely deployed in the companies today. And in the best case what company IT does is to manually apply bandwidth restrictions.

Smart, software defined networks have inbuilt, dynamic mechanisms to manage such scenarios. Remotes, branches and HUBs on the network “talk” to each other while balancing the network, turning it into smart and synchronized as whole. As an example while traffic increases at HQ it may ask the remote or remotes to slow down for a bit or increase the data transmission depending on backhaul conditions hence keeping operations smooth. No manual intervention is required. The network turns into proactive rather than being reactive.

Secure Web Gateway (SWG)

Distributed access, distributed workloads and apps, distributed edge clearly pointing out that legacy centralized security platforms needs to be transformed and security should be elastic and distributed. This is where the concept of SWG comes into play, ranging East to West, North to South, shielding users and units, apps and workloads wherever they are whether at home or in the office, on the cloud or in DC.

secure web
blog

In ever Increasing landscape of threats and sophisticated attacks it is quite important to keep the security tuned. Sometimes it may become a challenging task requiring complex and expensive on-prem devices. As a consequence high Capex and Opex. For the customers comfort FlixiWay has come up with its Security as a Service platform (SECaaS) delivering agile and comprehensive security wherever customer is and whenever in need. The features offered are: Stateful Firewall, Next Gen Firewall, URL filtering, IP filtering, UTM, Antivirus and Antispam, File Filtering, IPS/IDS. Services can be offered on the fly upon customer need and threats arose.