Hillstone E Series next-generation firewalls provide visibility and control of web-based application traffic regardless of port, protocol or IP address. Policies can be defined that guarantee bandwidth to mission-critical applications while restricting or blocking inappropriate or malicious applications. Administrators can control access to applications (and application features) based on users and/or user-groups regardless of IP address, location or device. Hillstone E Series firewalls incorporate comprehensive network security and advanced firewall features. They provide superior price performance, better energy efficiency, and a smaller size compared to competing products.
Granular Application Control
- Hillstone E Series firewalls provide granular application control. Administrators can build policies that allow specific users or user-groups to access selected applications. (Allow Marketing to access Facebook). It is even possible to limit access to certain features within an application. (Allow Marketing to access MSN IM but Not file sharing). Policies can also be defined that block or limit access to applications. For example, certain games may be blocked during work hours but allowed after work hours. Alternatively, some applications may be allowed during work hours but with limited bandwidth.
Proactive Threat Protection
- Hillstone E Series firewalls provide real-time protection for application and network attacks including viruses, spyware, worms, botnets, ARP spoofing, DoS/DDoS, Trojans, buffer overflows, and SQL injections. It incorporates a unified malware detection engine that shares packet details with multiple security defenses (IPS, URL filtering, and Anti-Virus), which significantly reduces latency.
Visibility and Control
- Hillstone E Series provides visibility and control of network traffic. An intuitive user interface displays all applications traversing the network along with application categories and bandwidth. An administrator can quickly choose an application and see all the users who are accessing that application along with bandwidth consumption. If a particular user is of interest the administrator can see all the applications that user is using - now and in the past. Inappropriate applications can be blocked or limited by bandwidth or time of day. Multiple reports show top applications, top users, top URLs, top URL categories, top threats, etc.