Firewall

Set-up and operation of firewall systems, remote maintenance, advanced persistent threats

Firewalls: a crucial security component

Whether on-premise, private cloud or public cloud, firewalls are a crucial aspect in protection of systems. We operate firewalls securely and advise you on necessary activation.

Contact

Benefits

Management of highly complex regulations

Management of regulations ranging from simple to highly complex based on customer requirements.

Tailored
solutions

Whether it’s Checkpoint, Palo Alto, SonicWALL, Sophos or Genua, we operate the right firewall solution for you.

UTM
solutions

Combined Unified Threat Management solutions offer ultra-secure protection and are managed centrally by Swiss IT Security Deutschland.

Set-up and operation of firewall systems, remote maintenance, advanced persistent threats

Every company needs a firewall – it protects against undesirable access to the company network and separates specific systems into special protection zones (DMZs). Firewall systems are increasingly complex, so it makes sense to entrust the Swiss IT Security Deutschland specialists with the set-up and operation.
Swiss IT Security Deutschland offers clients professional operation of firewall systems as a Managed Security Service. Today’s modern firewall has multiple components and functions, such as IDS/IPS, UTM, next-generation. We use products from a range of market leaders, including Check Point, Palo Alto, Sophos, Genua and SonicWALL.
Clients with hosted systems protected by the central Swiss IT Security Deutschland firewall are also automatically protected by an IDS. This examines network traffic for critical patterns and anomalies that indicate harmful or undesirable activity. It detects issues such as portscans from outside or bot activities from inside. The detection pattern is updated regularly.
The IDS detects and reports threats, and the IPS reacts and blocks them if necessary. Depending on client requirements, the IPS is usually activated, but can be configured to prevent disruption of operations.
The classic task of the firewall is to monitor ports and addresses, and block them where necessary. Today, the firewall, as the focal point of security for the entire network, has additional tasks, such as IPS, anti-virus protection, VPN gateway, DoS protection (against individual overloading attacks) and authentication. This turns a firewall into a UTM firewall.
The next-generation firewall goes a step further. It examines the application level and blocks unauthorised applications. For example, network traffic to Skype or certain social networks can be prevented; this also applies when these applications are used online.
Swiss IT Security Deutschland’ remote IT maintenance service helps with the performance of IT infrastructure maintenance on-site. A VPN tunnel and secured access are established between Swiss IT Security Deutschland and the customer network. Access options include SSH, MS Remote Desktop (RDP), VNC and browsers (for appliances). All data traffic is limited to the required IP addresses and services. The client can then request Swiss IT Security Deutschland support services by phone or email or via ongoing monitoring where necessary. This means the client always has access to Swiss IT Security Deutschland’ professional expertise and can take part in the knowledge transfer itself. Component monitoring and alerts can take place on the client and/or the Swiss IT Security Deutschland on-call service side.
Swiss IT Security Deutschland uses various procedures to collect, compile, evaluate and perform threat detection for extensive logs in real time. Threat detection through to security incident alerts is the task of security information and event management (SIEM). Long-term anomaly analysis is required for modern, highly targeted attacks known as advanced persistent threats, which penetrate and advance through systems unnoticed, often at a very slow pace.

Vendors & Certifications

Pioneering products and solutions from the world’s leading vendors

Checkpoint
Checkpoint

Check Point

Check Point is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices.

Palo Alto Networks
Palo Alto Networks

Palo Alto Networks

The network security platform from Palo Alto Networks enhances the visibility of applications, users and content, reduces the attack surface and protects networks and systems from known and unknown threats. The platform includes solutions for decentralised organisations, for perimeter protection and for the virtualised data centre – from hardware-based and virtualised firewalls and centralised management to the ‘WildFire’ cloud, which identifies and blocks unknown threats. The unique single-pass architecture with function-specific hardware support guarantees high performance.

SonicWALL
SonicWALL

SonicWall

The SonicWall Capture Cloud Platform seamlessly integrates security, management, analytics and real-time threat intelligence across the company’s portfolio of network, email, mobile and cloud security products. This approach enables our complete portfolio of high-performance hardware, virtual appliances and clients to harness the power, agility and scalability of the cloud.

Sophos
Sophos

Sophos

Our products enable you to protect all the endpoints in your network – laptops, virtual desktops, servers, internet and email traffic, and mobile devices. Protection is provided by products tailored to your specific needs. In securing your network, we offer what no one else can: simplicity.

genua
genua

Genua

genua GmbH ensures the IT security of digital infrastructures in complex, critical or regulated environments. In a dynamic and networked world, we make a contribution to the ability of companies and public organizations to act as well as to their sovereignty. We thereby ensure that the opportunities that this world offers can be used.

Download

Thank you for your interest!

You can download the product sheet by clicking the button below.