ADVANCED THREAT PROTECTION

Why Advanced Threat Protection?

It’s a steadily increasing problem for security everywhere, every day. Encrypted traffic—using HTTPS tunneling protocols via webpages or other sites—is becoming a trojan horse for cybersecurity solutions. Hackers are increasingly embedding malicious code in these web sessions, file downloads and emails that bypass security. Leading analysts estimate that already today more than half of the network attacks targeting enterprises used encrypted traffic to bypass security controls.

 

 

THE CHALLENGE

The traditional way—doing decryption and inspection on the firewall—decreases throughput and performance up to as much as 80%, and thus diminishes quality of service drastically. And with the proliferation of such encrypted traffic, nearing 100% in the next few years, IT administrators, CIO and CSOs—especially ones with a large responsibility for a community of users like public institutions like hospitals, schools and large enterprises—need a highly robust, compliancy ready on-premise product. They’re are looking for a way to protect their end users that can be screened in real time and doesn’t suffer this impact on firewall performance.

HOW TO SOLVE IT

What you need is a dedicated Advanced Threat Protection product, i.e. a security product designed for highly efficient encrypted traffic handling and intergraded threat and virus scanning. This product needs to be able to handle a large amount of traffic without suffering latency yet all the while it needs to adhere to the present and future compliancy requirements that keep that data safe at all times. 

Clavister NetEye appliances, scaling to fit the largest enterprise or institution, are the perfect Advanced Threat Protection products that address the SSL inspection challenge. And with virtual or cloud instances, you can find the right scale and need for your organization.

 

Clavister NetEye Products

Our Advanced Threat Protection products are designed for a virtual environment with linear scaling, but also available on hardware to fit your needs. Clavister also offers a hosted version in the cloud for full off premises threat inspection and providing agility for scaling.

  • Rack-mounted Models
  • Virtual Models
  • Cloud Models

Clavister NetEye Rack-mounted Models

NE-6200 NE-8000 NE-8500 NE-8900
SSL Inspection performance (Mbps)
250
500
1000
2000
Approx nr of users
250
600
1200
2500
Cloud Sandboxing
Yes

Hardware Specifications

Form factor
1U 19"
Power supply
100-240VAC, 50-60 Hz
Expansion slots
1
4
4
4
Compatible Modules
2 or 4 x 10GbE (SFP+)

Recommended Use-Cases

Typical environments
Enterprise
Enterprise, Datacenters
Enterprise, Datacenters
Enterprise, Datacenters

Clavister NetEye Virtual Models

NE-50V NE-100V NE-250V NE-500V
SSL Inspection performance
50
100
250
250
Approx nr of users
50
100
300
600
Cloud Sandboxing
Yes

Recommended Use-Cases

Typical environments
Medium sized offices

Virtual specifications

Minumum available memory in VM (GB)
16
Minimum recommenced allocated CPU cores
4
6
8
20
Supported hypervisors
VMware, KVM
Minimum available storage (GB)
16

Clavister NetEye Cloud Models

NE-50C NE-50C NE-50C NE-50C
SSL Inspection performance
50
1000
250
500
Approx nr of users
50
1000
300
600
Cloud Sandboxing
Yes

Recommended Use-Cases

Typical environments
Small to Medium sized offices