Unified Threat Management
The Nebero Systems Unified Threat Management program enables multi-dimensional protection of Internet usage policies, while meeting specific compliance guidelines that have been mandated by certain governmental regulations. Through a 7-layered OSI model, our UTM software incorporates crucial security programs like rule based filtering, intrusion prevention and detection, secure VPN, gateway level anti-spam, anti-virus for maximized protection from both internal and external network threats. In addition, our Unified Threat Management program incorporates the Nebero bandwidth manger; in real-time it distributes, manages and prioritizes bandwidth based on port, protocol or application. Not only that, but our UTM features a world-class site-to-site and user-to-site, Virtual Private Network.
Next Generation Firewall Protection
Our Unified Threat Management software incorporates the Nebero Systems next generation firewall as its main component in order to perform essential inspections throughout all 7-layers of your network. The Layer 7 rules can be defined at three different levels - global, group and user (devices IP address). These specific rules are important because they allow for SNAT, DNAT and port based NAT to be implemented by network administrators for secure access from outside of the network. A port based NAT will even allow access to multiple internal servers or devices by sharing an individual public IP address. Another important feature that our next generation firewall offers is the support that is given to a perimeter network or DMZ in order to provide optimal protection for enterprise application servers and ERP systems. This will allow for a system to be fully protected against both internal and external network attacks.
Load Balancing and Redundancy
With our load balancing and redundancy feature, your organization is able to utilize 16 different connections all at the same time. By incorporating the Nebero Systems load balancing and redundancy software each one of your Internet links will be used to optimize full business output and potential. When it comes to connectivity, all your important web traffic will be routed through user IP address, specific protocol, port or destination network. Our load balancing and redundancy feature will easily exceed all of your expectations as additional fail overs can be implemented to provide maximize internet uptime for business continuity and disaster recovery. In order to achieve maximum redundancy, a variety of the Nebero UTM deployments operate as a cluster, which is also offered a one of our world-class solutions.
Intrusion Prevention System
To provide our state-of-the-art intrusion prevention system, we use multi-threaded, high performing, open source technologies that allow for deep packet inspections. Because of this, a very low latency is produced allowing for high throughput achievements that are necessary to maintain specific detection protocols and protection to thousands of file types. Additionally, the Nebero Systems intrusion prevention system ensures that a protective Data Leakage Prevention policy has been established by precisely calculating an automatic MD5 checksum for files that are either leaving or entering your organizations network. By defining a list of specific company related file names and other crucial data, important content will be completely protected from leaking out of your network. With this specialized feature, network rules can be defined in the web console to specifically identify and examine certain sources or network destinations that are determined by the system administrator. Through this process, deep packet workloads will be reduced so that false positive alarms are minimized.
With out elite bandwidth management feature, we are able to manage your network at multiple levels. Nebero offers an easy to use, web-based console that is utilized to define tree structure in order to divide your available bandwidth between various departments, users, protocols and applications. To ensure that your usage is being maximized at all times, we incorporate asynchronous bandwidth management algorithms that are used to establish either isolated or shared bandwidth pools. Not stopping there, we completely understand how important Quality Of Services (QOS) is to your business. Because of this, we have defined QOS practices for multiple protocols and applications to ensure that your organization achieves optimal results for VoIP, ERP, Email, CRM and other important enterprise applications.
Secure Virtual Private Network
The Nebero System secure Virtual Private Network (VPN) software creates encrypted data tunnels between different office locations in order to provide a secure connection. Through our encrypted data tunnels, all of your organizations important applications like ERP, CRM and other software will continually be protected at all times. Because of our world-class VPN, you are also able to remotely manage desktops and other devices so that you can reduce IT infrastructure and manpower costs. In order for our software to be effective, we are able to support VPN and PPTP to establish the Nebero VPN between multiple locations (location-to-location VPN) or from a user-to-office location (road warrior). Not only that, but certain mobile devices like an iPhone, Android, Windows based phone, tablet, laptop and remote desktop can also be used to create a VPN connection to the office.
Utilizing various databases that contain more than 10 million current and relevant websites that are categorized into 50 different categories, the Nebero web filter can be completely customized by your organization so that certain websites can be added or removed from these categories. HTTPS websites can also be blocked just like HTTP websites using SSL Bump methodology. HTTPS and HTTP filters can be enabled on certain users whereby providing discretionary access depending on the role of the users. Our web filtering program incorporates a unique mechanism that is able to identify specific keywords with regular expression matching procedures that allows for a faster and more accurate response time when handling both new and upcoming websites. Requiring users to abide by specific company usage policies, a corporate network web filter can easily block sites like the Apple App Store or Google Play Store for specified users.
Web Application Firewall
Acting as a reverse proxy network based firewall that is pre-loaded with extensive rule-sets (ACL), the Nebero web application firewall provides updates on a regular basis in order to secure organizational applications that are continually exposed. Nebero Systems is able to provide region specific access rules that only allow traffic from certain countries or fixed IP addresses to enterprise applications so that they are regularly protected against automated BOT attacks or intrusion attempts. The threshold for our web application firewall can be defined for various parameters like the maximum number of connections per minute from any specific IP address. Not stopping there, we allow time-based access to be established in order to prevent network access during non-office hours.
Performing on the network gateway level, our anti-virus module acts as the first line of defense against preventing virus-infected files from being downloaded from the as either web content or an email attachment. Through the Nebero Systems open source anti-virus program, your organization will receive continual updates throughout the day that contain a precise level of accuracy for virtually any virus that is found on the. We also offer a proprietary anti-virus integration that is supported and licensed separately. Without question, our elite anti-virus protection will leave your organizations network protected at all costs.
The Nebero Systems anti-spam software uses multiple RBL lists, SPF, domain keys and content analysis in order to examine every single email that enters your organizations network to ensure that only legitimate emails are received by users. Our one-of-a-kind anti-spam feature will scan all emails in a transparent mode with no configurations required on both the client or server side. In case malicious content or attachments are sent to user email addresses, email content will be reviewed and replaced by standard defined messages and subject headers will be modified to show relevant headers.
Reporting and Analytics
Providing you with an intuitive reporting and analytics module, we are able to generate in-depth informational and data reports regarding user behavior, website usage patterns, specific content downloads, exact bandwidth usage by various protocols and applications, per second Internet usage (real time), MRTG graphs for individual Internet connections and the top files that are being downloaded in your network. Additionally, our reporting and analytics module will identify which users or devices have attempted to access blocked websites and content. Once all of your information and data has been gathered, an in-depth report will be sent to your administrator on a daily basis. Not stopping there, we are able to customize reports to your exact needs as long as the report requirements have been scheduled and communicated to Nebero Systems.
Because we don't use hardware appliances, the Nebero UTM is ideal for companies that truly care about the environment. Through our efforts to "go green", we are able to work with you to cut down emissions and reduce the overall global carbon footprint. With other solution providers, you are required to through away your old UTM appliances if you decide to upgrade to a new device. This is not the case with Nebero Systems. Because of a soft UTM, our products and solutions can be ported on a more effective virtual environment or hardware infrastructure, which will greatly help reduce costs and emissions.