Mail Guard
Controls emails entering and exiting the organisation, defending against advanced attacks and misuse.
Mail Guard is highly configurable and assured platform for boundary protection of secure e-mail-based information sharing system.


Main features:

  • Controls email traffic entering and leaving an organization,
  • Delivers SMTP and X.400 application proxying,
  • Provides advanced attack defense focusing on the application content,
  • Contains rich functionality for security labeled data,
  • Advance and deep content inspection covering a rich range of file types,
  • IDAM enabled,
  • Offers a feature rich Graphical User Interface.

Download the brochure

 

 

Web Guard
Controls web traffic entering and exiting the organisation, defending against advanced attacks and misuse.
Highly configurable and assured platform for boundary protection of secure web services-based information sharing systems.


Main features:

  • Controls web service data entering and leaving an organization,
  • Provides HTTP and HTTPS application proxying,
  • Provides advanced attack defense focusing on the application content,
  • Rich functionality for security labeled data,
  • Authentification of clients and servers.

Download the brochure

File Transfer Guard
File Transfer Guard controls file transfer entering and leaving the organization, defending against advanced attacks and misuse.

It is used by organisations that need to tightly control file transfers with Internet servers or need to pass files between separate internal zones.
Main features:

  • Deep inspection of the files that are being transfered,
  • Supports FTP protocol,
  • Provides client and server authentication,
  • Supports security labels.

Download the brochure