A UNIVERSAL SECURITY GATEWAY

Similar documents
WEB APPLICATION FIREWALL

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

SECURE SOURCE DISTRIBUTION (M) SDN BHD

Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Who We Are.. ideras Features. Benefits

Cybersecurity Employment SecureNinja

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.

Future-ready security for small and mid-size enterprises

Career Paths In Cybersecurity

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Gigabit SSL VPN Security Router

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

Ingram Micro Cyber Security Portfolio

Business Strategy Theatre

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Mohammad Shahadat Hossain

We re ready. Are you?

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs

Expert Reference Series of White Papers. DirectAccess: The New VPN

Course 831 Certified Ethical Hacker v9

AT&T SD-WAN Network Based service quick start guide

Building the Cybersecurity Workforce. November 2017

CIT 480: Securing Computer Systems. Putting It All Together

Certified Ethical Hacker (CEH)

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

Advanced Knowledge & Learning

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Edge for All Business

Unlocking Potential Through Learning

Certifications Part Two: Security Certifications By Shawn Conaway

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

How Breaches Really Happen

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

IT Technician Pathways Course Guide

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

GCIH. GIAC Certified Incident Handler.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

NetDefend Firewall UTM Services

Cyber Security: It s all about TRUST

Certified Ethical Hacker V9

Implementing and Administering Security in a Microsoft Windows Server 2003 Network. Designing Security for a Microsoft Windows Server 2003 Network

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Knowlogy Class Schedule

DIABLO VALLEY COLLEGE CATALOG

Introduction. The Safe-T Solution

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

AT&T Dedicated Internet Express

CCNP ROUTING & SWITCHING

Exam: : VPN/Security. Ver :

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

PT Unified Application Security Enforcement. ptsecurity.com

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

MyCloud Computing Business computing in the cloud, ready to go in minutes

All-in one security for large and medium-sized businesses.

Certified Cyber Security Analyst VS-1160

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA. SY0-401 EXAM CompTIA Security+ Certification Exam. m/ Product: Demo. For More Information:

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

MX Sizing Guide. 4Gon Tel: +44 (0) Fax: +44 (0)

Deploying Cisco ASA VPN Solutions v2.0 (VPN)

Security with Passion. Endian UTM Virtual Appliance

DIS10.3:CYBER FORENSICS AND INVESTIGATION

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

to Enhance Your Cyber Security Needs

Unified Threat Management Systems

BUILDING AND MAINTAINING SOC

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Ethical Hacking & Information Security. Justin David G. Pineda Asia Pacific College

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

GCIA. GIAC Certified Intrusion Analyst.

SERVICE DESCRIPTION SD-WAN. from NTT Communications

Test Report April esafe Virtual Appliance

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

NSG50/100/200 Nebula Cloud Managed Security Gateway

CERTIFICATION TRAINING - ISC2

Simplify Your Network Security with All-In-One Unified Threat Management

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Microsoft Internet Security & Acceleration Server Overview

Designing Windows Server 2008 Network and Applications Infrastructure

Cisco SA 500 Series Security Appliances

DATASHEET. Advanced 6-Port Gigabit VPN Network Router. Model: ER-6. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

Junos Security Bundle, JSEC & AJSEC

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

DIS10.4ADVANCED NETWORK SECURITY

CCISO Blueprint v1. EC-Council

Transcription:

A UNIVERSAL SECURITY GATEWAY IDS /IPS / HTTP AV/ Web Content Filter / Web Load Balancer / Web Reverse Proxy / Multi-line Internet / Network IP &Protocol Monitor / IP Reputation Blocker / Captive Portal / Site-to-site VPN / Client-to-site VPN / IM inspector / IPV6 enabler Kaapagam Technologies Sdn. Bhd. (1015448-T) Unit No:9, 1 st Floor, Resource Centre, Innovation Incubation Centre (IIC), TPM, 57000 Bukit Jalil, Kuala Lumpur Tel : +603 8992 3172 Fax : +603 8998 4010 Email : sales@kaapagamtech.com Web: http://www.kaapagamtech.com

VALAI is a firewall appliance on steroids, its key technical features that techies would appreciate : Layer 7 Intrusion Detection & Prevention Web Content Transparent Filtering, with Groups, Time of Day Restrictions and up to 74 blocked content categories (eg porn, warez, social networking etc) Transparent Ad-blocking to speed up internet access, and make smartphone/tablet app access less obnoxious Multi-line Internet Load Balancing (eg Unifi + YES) for high availability internet and higher speeds Web Reverse Proxy Host multiple websites (dozens) with a single public IP Webserver Load Balancing to redirect traffic to multiple backend webservers with Smart Backend Switching Web Caching to accelerate your internet connection by caching frequently visited sites IP Reputation services with frequent updates (block malware IPs) Filtering/shaping High Performance SSL VPN Server with Perfect Forward Secrecy (Mac/Win/Linux/IOS/Android clients) Unlimited SSL VPN clients High Performance IPSEC VPN Server for legacy installations Unlimited IPSEC VPN clients Site-to-site VPN to link HQ & branch offices subnets transparently HTTP antivirus for additional protection from infected websites IM inspector (inspect supported instant messenger traffic) Embedded hardware for maximum reliability in hostile environments 5 Gigabit flexi interfaces VLAN support Full IPV6 support even when your ISP doesn t support IPV6 (eg Unifi) IP Guard prevents unauthorized devices from getting network services Advanced DHCP/DHCP6 server Splitzone DNS Monitoring and Reporting Reporting based on Top Sites, Top Users as well as detailed logs of internet usage High efficiency 64bit Intel Quadcore processor Very lower power consumption Powered by BSD-flavored *nix ALL the above features, out-of-the-box without any additional activation/subscriptions required!

Note : Your Final Product casing may vary based on your requirements For the business owner, our value proposition is : We have ALL the required features that the competition offers, at a fraction of the cost. And you get all the listed features out of the box, with no hidden costs. The benefits are clear: Improved productivity of employees by controlling access to business related sites Improve security via secure VPN, malware blocks, HTTP antivirus Improve internet performance via caches Reduce bandwidth due to inappropriate internet usage, ads, etc Block threats to your network using a variety of measures (IDS, IP Reputation, Policy, etc) Reduce the risk of PC infection due to infected websites or hijacked ad banner networks Combine 2 internet lines for redundancy & performance Make your smartphone/tablet access relatively ad free Extensible design, allowing additional (free) modules which are released all the time No nickel and diming to death, as with other firewall vendors. Eg most vendors need separate license for VPN (eg 5 user license), and another license for content filtering (eg up to 25 users), and another license for IDS (how many IPs and servers), and yet another license for antivirus, and another license for advanced analytics. All of which starts adding up to serious costs we don t! You get all up front an Enterprise ready, Universal Security Gateway, ready to work for you. and many more!

SUPPORT & MAINTENANCE VALAI will be deployed with 1 year Maintenance and Support on Software components and rule sets. Customer will be provided with a telephone number and email to make Service / Support Request. The Support number operates during business hours, 9:00 a.m. to 5:00 p.m. (GMT +8), Monday through Friday, excluding legal holidays. Extended coverage is available for an additional fee. All Software related supports will be done remotely via Team Viewer or VPN access. The Support is inclusive of any patches and upgrades to the existing system. Maintenance & Support is renewable yearly OUR CONSULTANTS Seasoned Consultants Deliver... Kaapagam Technologies is committed to delivering the highest quality consultancy to help you achieve your business goals and eliminate issues. No matter which technology or devices you use, you can count on our consultants with years of hands-on experience to be your teammate. At Kaapagam Technologies, we select only the experts in their respective field who can pass our rigorous selection process. Each consultant is an acknowledged subject matter expert who is dedicated to customer s requirements List of Certifications achieved by our consultants Certified Information System Security Professional (CISSP) Certified Ethical Hacker (CEH) Computer Hacking Forensic Investigator (CHFI) EC-Council Certified Secure Programmer (ECSP) EC-Council Certified Incident Handler (ECIH) EC-Council Certified Security Analyst (ECSA) EC-Council Certified Licensed Penetration Tester (LPT) EC-Council Certified Disaster Recovery Professional (EDRP) EC-Council Certified VoIP Professional (ECVP) EC-Council Certified Instructor (CEI) Open Source Wireless Integration Security Professional (OSWiSP) Offensive Security Certified Professional (OSCP)

GIAC Certified Security Essential (GSEC) GIAC Certified Penetration Tester (GPEN) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Reverse Engineering Malware (GREM) SCSAS (Sun Certified Solaris Associate) CCDA (Cisco Certified Design Associate) CCNA (Cisco Certified Network Associate) Microsoft Certified Systems Engineer (MCSE) Microsoft Certified Professional Developer (MCPD) Microsoft Certified IT Professional Business Intelligence Microsoft Certified IT Professional Enterprise Messaging Microsoft Certified Technology Specialist Web Applications Microsoft Certified Technology Specialist Virtualization Microsoft Certified Technology Specialist Database Microsoft Certified Trainer (MCT) Microsoft Most Valuable Professional (MVP) - Security CONTACT US At Kaapagam Technologies, customer service is everyone's responsibility. Our goal is to provide "High Calibre" service to our customers. For further details, please contact: Clement Arul @ clementarul@kaapagamtech.com Unit No: 9, 1 st Floor, Resource Centre, Innovation Incubation Centre (IIC), Technology Park Malaysia, 57000 Bukit Jalil, Kuala Lumpur Tel : +603 8992 3172 Fax : +603 8998 4010 Email : sales@kaapagamtech.com Web: http://www.kaapagamtech.com