PERIMETER SECURITY
NEXT GENERATION FIREWALL
PANW_Parent_Brand_Primary_Logo_RGB_Red_White.png

The Palo Alto Next Generation Firewall is a device that can provide visibility and control over the network by using traffic identification, malware prevention, and threat intelligence technology to protect an organization's network from cyber security attacks.

Logo-banyak-2-light.png
FPLogo_1C_White_WEB_180x34_002.png

The Forcepoint Next Generation Firewall is a network security tool that monitors network traffic, allowing or blocking data packets thereby providing protection and visibility to manage traffic more efficiently.

Fortinet-logo white.png

Fortinet Next Generation Firewall provides antivirus, antispyware, antimalware, application control, that obtain full visibility and protecting the network from all layers.

SANDBOXING
PANW_Parent_Brand_Primary_Logo_RGB_Red_White.png

Palo Alto WildFire is a cloud-based service that provides malware sandboxing and fully integrates with the vendor's on-premises or cloud-deployed next-generation firewall (NGFW) line.

Logo-banyak-2-light.png
FPLogo_1C_White_WEB_180x34_002.png

Forcepoint Advanced Malware Detection  leverages proven technology to detect zero-day and other advanced malware and emulates an entire host to expose and observe a malicious object’s possible actions.

Fortinet-logo white.png

FortiSandbox is a protection solution that integrates with Fortinet’s Security
Fabric platform to address the rapidly evolving and more targeted threats.

Trellix-Logo-White.png

Trellix is an Advanced Malware Analysis tool that can detect threats, such as APTs hiding in an organization's network.

NETWORK THREAT ANALYSIS
Trellix-Logo-White.png

Trellix is security analysis platform that is capable of detecting security incidents with surface insights from multiple vector telemetry.

Logo-banyak-2-light.png
vectra2.png

Vectra is an AI Driven threat detection and response solution for cloud, data center, IOT and enterprise.

Group IB logo.png

Group-IB solution is aimed at detection and prevention of cyberattacks, online fraud, and IP protection.

THREAT BLOCKER
bandura-logo-white.png

Bandura ThreatBlockr Node performs inline inspection of network traffic making policy-based allow and deny decisions based on cyber intelligence, country, and/or Autonomous System Number (ASN).

Logo-banyak-2-light.png
Keysight_Technologies_Logo for comp pro.png

Keysight ThreatARMOR makes cyber threat analysis more efficient by monitoring/blocking traffic to and from known-bad sites and untrusted countries. It also eliminates network traffic from phishing sites, malware distribution sites, botnet controllers, hijacked networks, and unallocated IP addresses.