Firewall Solutions

Firewall Solutions

Secure firewall solutions from RGTS - A ConvergeOne Company (RGTS) help protect your organization’s network from unauthorized access — both external and internal — while permitting unhindered high-speed communications for legitimate business.

RGTS converges its extensive professional expertise with the industry’s most advanced security hardware and software to address the heavy demands on today’s firewalls:

  • Network users are many, diverse, mobile, and widely dispersed.
  • Network traffic exposes organizations to many risks from wide-ranging, constantly changing access devices, applications, and operating systems.
  • Network security threats are unrelenting, sophisticated, and constantly advancing.
  • The consequences of network security breaches can be serious or catastrophic.
Read More

RGTS firewall solutions incorporate the industry’s fastest, most advanced hardware and software, which provide deep-packet inspections and multi-faceted protection methods without creating bottlenecks that hamper network speed.

Firewall hardware ASIC (Application-Specific Integrated Circuits) processors deliver extremely high performance, ultra-low latency, and scalability.

RGTS’s broad options range from pure firewall configurations to full Unified Threat Management (UTM) devices, which can include network intrusion prevention, gateway anti-virus protection, gateway anti-spam security, VPN, content filtering, load balancing, and data leak prevention.

Protecting All Points of Access

A good practice is to deploy firewalls not only at the boundaries separating a private corporate network from the public Internet, but also in key internal locations throughout the company, and at the edges of branch-office networks.

Such internally distributed firewalls help protect against internal threats, which account for a large percentage of cyber losses, according to studies by the Computer Security Institute. These internal firewalls block employee access to network and data resources that corporate policy dictates are off-limits to them. Firewall partitioning of the corporate intranet gives departments within an organization additional defenses against threats that originate from other departments.

Placing such firewalls internally also helps companies comply with information security regulations such as the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act (HIPAA), and the Payment Card Industry Data Security Standard.

The private-public network edge is still particularly vulnerable to intrusions, however. So are wireless LANs, which can be hacked when radio signals pass through building walls to the outdoors. Therefore, RGTS recommends firewall configuration in the following network locations:

  • At the corporate network perimeter, where the data center meets the WAN and Internet
  • Between departments, restricting access according to company policy
  • Between corporate LAN switch ports and servers in the data center
  • Between the wired LAN and the wireless LAN
  • At the WAN edges of branch offices

RGTS also recommends software or hardware firewalls for laptops, smartphones, and other mobile devices that store corporate data.