Protect Your Network From Hackers

Cyber "SMART" Your Business

A Firewall alone CANNOT Protect Your Network!

You are vulnerable to…

  • Loss of access to business-critical information
  • Damage to your company’s reputation
  • Temporary loss of ability to operate

Why Choose the Active Cyber Shield?

  • Customizable, cost-effective, turnkey deployment solution for the Active Cyber Shield.
  • No Hardware or Software to ever purchase and we will replace any failed hardware absolutely free of charge.
  • No need to try to spec your own hardware; we’ve done the hard work for you. Every appliance is guaranteed to work seamlessly with our software.

Configured for You

  • With every subscription, you can renew each year and benefit from all new applications as they are released, at no additional charge! Because the Active Cyber Shield is subscription-based, you’ll always get updates, patches, improvements and new apps at no additional charge.
  • Whether you need to support tens or hundreds of users, we’ve got the right appliance for you.
    We cover small businesses, remote or branch offices, medium businesses, enterprise divisions and small campuses. With your subscription, you get the same enterprise-grade applications and the backing of our Live Support team.

Solutions by Industry

Network security in the federal government has been under attack not only by hackers, but by the scrutiny of the public. With more and more data breaches occurring and sensitive information being released, the federal government must protect its assets and personnel information from future threats. Implementing a next ­generation firewall and intrusion prevention system is a necessary step for network administrators to ensure a safe and secure environment for sensitive information. With Active Cyber Shield, the federal government and its entities are able to monitor and investigate potential breaches with a cost ­effective solution.

The adoption of mobile technology has rapidly increased following the Executive Order mandating government agencies streamline the delivery of services to lower costs, decrease delivery times, and improve the customer experience. To meet this directive, government agencies are moving to an IT infrastructure where data is accessible to users on any device of their choice. This requires network administrators to make the shift from securing devices to securing the data itself. This is paramount as not doing so puts identifiable information such as name, address, birth date and Social Security Number at risk.

WiFi is now the top amenity customers want. It’s mandatory for businesses to provide a high level of service cost-effectively. While most hospitality organizations have deployed WiFi, having it available is just the first step. Ensuring a secure and reliable Internet connection for all users is the real difference between WiFi being a success or failure.

Financial institutions are seeing an unprecedented increase in network attacks. Cyber-criminals capable of evading legacy security solutions are focusing on the financial industry and the treasure trove of information it holds. To combat this, network administrators must upgrade to next-generation firewalls and other appliances that are comprehensive and cost-effective. Protecting sensitive client data is just one issue in an industry where time is money. Ensuring speedy access to business-critical applications is just as important. Additionally, companies must comply with regulation including SOX, FINRA, GLB, and PCI DSS.

Electronic Health Records (EHR) mandates are driving the adoption of connected devices at healthcare providers. Healthcare providers, organizations, and data warehouses must tightly control and secure patient health information (PHI) to ensure HIPAA and HITECH compliance. More devices on the network can also cause unpredictable spikes in traffic that limit mission-critical applications sending and receiving data

Nonprofits face many of the same challenges as for-profit businesses, such as securing their networks and data while keeping their staff safe and productive. But often, nonprofits have tighter operational budgets and even fewer resources to deal with IT infrastructure, online security, and secure data issues.

To make sure that network security doesn’t take a backseat to other budget needs, Active Cyber Shield provides nonprofit organizations with the same powerful, easy-to-use solutions that it sells to businesses, but with special pricing to fit those tighter budgets.

College students are bringing more connected devices on campus than ever before, using them to access more web-based applications and high-definition content every day. Their mobile, digital lifestyle has led to unpredictable spikes in network traffic that can bring school networks to a crawl at any given time. Attempts to solve the problem with expensive bandwidth upgrades have only led to increased bandwidth usage by students.

Online assessments, web-based learning tools, and mobile devices are driving the future of K-12 education. Network administrators have tried costly network upgrades to increase bandwidth and expand the reach of their WiFi networks, but have found these efforts insufficient.

The challenges of network security for a single office location are magnified for distributed organizations. With more than 1.6 million branch offices in the U.S. alone, companies spend a combined $10 billion per year on branch networking solutions. From franchises to retail locations, headquarters to remote workers, the edge of network is a diverse patchwork of possible attack surfaces.

Active Cyber Shield simplifies network security and internet connectivity across distributed organizations. Active Cyber Shield Firewall and Command Center can help companies address security, bandwidth utilization, application performance, centralized management—all while controlling costs.

Solutions by Issue

In the past, blocking website content based on URL and port 80/443 was all you needed to do. Employees accessed the internet at office locations by directly connecting to the corporate LAN. Managing internet access with legacy web filters and their basic block/allow rules worked fine.

However, as the internet evolved, so did the types of websites and applications employees accessed both on-site and away from the office. As functionality rapidly moved to the server, it sparked the meteoric rise in cloud-based applications and changed the way content would be delivered over the web.

Network administrators need next-generation web filtering to effectively stop the internet traffic they don’t want.

This change exposed the inflexibility of legacy web filters and rendered their basic block/allow rules ineffective. Today, websites and applications proactively hop ports to improve their reliability and speed. Increasing functionality makes some parts of a website or application mandatory for one group of users, while for others it is not. And with more traffic continuing to go through HTTPS, it increases the amount of traffic legacy web filters are unable to see that automatically gets passed through.

The Internet of Things (IoT) has been a rising phenomenon over the last few years. There are more and more common devices connecting to the Internet like TVs, printers, garage doors and thermostats with more being added every day. In 2015, there were over 4.9 billion connected devices and Gartner estimates there will be more than 50 billion in 2020.

But with the rise of connected devices comes the increased security risks that lie within the devices. Most of these connected devices are not built with security as a priority feature. Small businesses rely on many connected devices like printers, scanners, TVs, and video equipment to run their businesses––all of which are connected to the Wi-Fi router.

Unfortunately, most Wi-Fi routers are also not built with security in mind. In early 2016, The Wall Street Journal looked at the security capabilities of the top 20 consumer routers and found that only six of those had up-to-date firmware at that time, and just two of them had good password processes. Some small businesses (as well as home offices) don’t have corporate firewalls or unified threat management (UTM) systems in place and are relying on these consumer-level routers that aren’t providing enough protection.

The Threat of Hackers

As with any new device or software, hackers love to find the vulnerabilities and exploit their findings. In 2015 alone, cybersecurity experts discovered major flaws in some connected baby monitors, IP-enabled toys and even a connected car. Hackers are not just focused on corporate businesses anymore; home and small-office networks are seen as soft targets that may provide a way in to larger targets, like larger business partners, client companies or corporate employers.

Protect Your Small Business

Many small businesses don’t have the resources or budget to have IT professionals on staff or invest in enterprise-level network security systems. There are a few things small business owners can do to increase security and reduce the risk of hackers gaining access to the network.

Cyber security threats and attacks are always evolving. Viruses, worms, trojan horses, spyware, adware and scareware have all been around for a long time. One type of malware, however, has been grabbing headlines and creating headaches for users and IT professionals alike: ransomware.

Ransomware is defined as a type of malware that creates a restriction of some type on the user’s computer. In order to remove the restriction, the user must pay a ransom. This form of crimeware is unique in that it tries to coerce the user into directly paying the criminal––effectively turning the malware itself into a way for the attacker to profit. Over the past five years, ransomware has become more and more widespread because of the initial success of cybercriminals in convincing victims to pay to recover their files.

Hackers often use trojan horses to spread ransomware. A trojan horse (or simply, “trojan”) is any program which disguises itself in order to get a user to install or execute it. Trojans often masquerade as system or software updates, macros or other software add-ons. In reality, they carry malicious payloads that can have any number of undesirable effects: giving the hacker privileges on the computer via a “backdoor”; destroying files or corrupting disks; taking control over computing resources to use some or all of them as part of a “botnet”; or even stealing personally identifiable information like name, address, credit card information or other sensitive data directly or by “keylogging”. In the case of ransomware, the trojan hides the malicious code and tricks the user into executing it. The ransomware then is able to infect the host computer (and possibly all mounted disks and network shares).

Notorious ransomware like Cryptolocker, CryptoWall and Locky all work in similar ways. These three widespread exploits all attack files on the victim’s computer and encrypt them with a private key known only to the hacker. This makes the files useless to the victim; they can no longer access the contents without the key. To obtain the key and decrypt the files, the victim must follow the criminal’s instructions to make payment and obtain the decoder.

How is Ransomware Spread?

Ransomware can be distributed through the same vehicles as other malware: software downloads from websites, attachments to emails, and even malicious ads (known as “malvertising”) delivered over online ad networks.

With more than 1.6 million branch offices in the U.S. alone, companies spend a combined $10 billion per year on branch networking solutions. Many organizations struggle with the price, performance and flexibility of their WANs. Company objectives like digitization initiatives and the adoption of public cloud services make internet connectivity business-critical. Skyrocketing WAN costs, complexity of network management, and reliability issues can all impact business continuity.

Organizations often utilize a hybrid WAN consisting of MPLS and backhauled traffic while seeking lower-cost options for connectivity. This complex network topology can be difficult to manage, and security often becomes an afterthought—leaving the network edge open to attack.

SD-WAN

Software-defined WAN solutions help organization make use of different routes to the internet: across service providers, physical locations, and networks. There are a number of different criteria necessary for an SD-WAN solution to meet:

  • Routing
  • Security
  • WAN optimization

Solutions can include software, hardware and over the top (OTT), cloud-based services. Furthermore, overseeing WAN edge functions at scale requires centralized, cloud-based management tools.

Organizations can benefit from SD-WAN in a several ways. It gives administrators more control over the network infrastructure while reducing capital and operational expenditures. Furthermore, it enables them to take full advantage of the benefits of cloud-based software services, improving agility and responsiveness without the need for installed solution refresh cycles.

The IT landscape has changed from businesses issuing managed devices to a mix of both business-provided and personally owned devices (bring your own device or “BYOD”). The shift to BYOD has been driven by the ubiquity of consumer electronics and businesses accommodating employee requests to use their personal devices for work. The bottom line for businesses has also improved from BYOD increasing employee productivity and reducing overhead costs to track and manage company-owned devices.

Network administrators need a solution that can handle all devices—whether business-managed or personal.

The Need For Open Wi-Fi

In addition to BYOD deployments increasing, the way devices connect to the network is also in a state of transition from ethernet to wi-fi. With wireless connectivity a standard capability in laptops, cell phones, tablets and other devices, effectively deploying BYOD requires businesses to provide open wi-fi access for these personal devices.

For network administrators to support both BYOD and open wi-fi, they need a solution that can handle all devices–whether business-managed or personal–that connect to both the wired and wireless network.

Supporting BYOD and Open Wi-Fi

The Active Cyber Shield makes it simple for businesses to support BYOD and open wi-fi by identifying all users through a Captive Portal and if available, Directory Connector. Once identified, Untangle ensures security and enforces policies so each individual user has the right access to network resources. Unidentified users can be put into a generic user group to limit their network access, preventing any security risks or bandwidth impacts they would otherwise have on the network. This ensures employees can freely use their personal devices they are comfortable with on a secure, reliable business network.

The Active Cyber Shield ensures security and enforces policies so each individual user has the right access to network resources.

Protecting the Endpoint

Along with protecting the network, protection at the endpoint is important as devices can be brought on-site with previous malware and other inherent risks like USB file transfers, rootkit/jailbreaking vulnerabilities, and personal information on the device. To handle the endpoint requires clear rules of engagement and communication across stakeholders in IT, legal and finance. Once a strategy is in place, businesses can comfortably deploy BYOD and open wi-fi access knowing the network is secure and the business stakeholders are ready.

Enforce filtering, protection, and monitoring of remote devices with full tunnel VPN

Whether you’re provisioning mobile devices to your employees or running a 1:1 program for your K-12 students, you need to be able to control what happens to those devices even when they’re off your network. Mobile devices are inherently promiscuous, connecting via cellular and wifi networks that may or may not have sufficient security protocols in place. You work hard to keep threats off devices connected to your local network; be sure those same devices aren’t left exposed when they’re in the wild.

Mobile Policy Enforcement

The Active Cyber Shield’s Mobile Policy Enforcement can help. Using Xauth over IPsec VPN, it’s simple for schools and businesses to provide VPN access to Untangle. Xauth is natively supported across all major operating systems (Windows, Mac, iOS and Android), from the phone to the desktop. That means no third-party or client software installation needed. Regardless of where the device is located, it will get all the benefits from the same policies and protections as users behind an Untangle appliance on your local network. If you’re looking for the quickest way to enforce policy across all your devices, no matter where they are or how they connect to the Internet, NG Firewall is the solution for you.

K-12 and 1:1 Programs

If you’re issuing mobile devices to students, you may be putting your CIPA compliance at risk. You need to ensure that students stay safe no matter where they’re connecting from – whether at home, the library or elsewhere. You also need to be sure that the devices you’ve entrusted them with are kept secure from malware and other threats. How can you manage this without dealing with installing software on every device?

Active Cyber Shield Firewall can help. By ensuring mobile devices connect to the Internet via forced full tunnel VPN using Xauth, you can have the same network policies you’ve put in place on campus be in effect no matter where those devices wander.

With data breaches increasing each year, companies are investing in top-of-the-line security solutions to prevent hackers and outside attacks from gaining access to their networks. But what about the risk of an attack originating from within the company? Every industry is potentially vulnerable to these types of attacks from both employees and trusted third parties.

The Inside Threat

Identifying which employee, business associate or trusted third party can pose a threat can be extremely challenging when the risk can come from anyone: a current or former employee, contractor or business partner with access to the system, network or data. Disgruntled employees might seek revenge on the company that they perceived to have wronged them, or an undervalued worker might feel a sense of entitlement and sabotage the company.

With many ways to extract data or create backdoors into the systems, nothing is safe. An insider may have the ability to impact the confidentiality, integrity or availability of the company’s systems, networks or data. Solutions designed solely to prevent outside attacks cannot combat the risks coming from within the organization.

Network Control and Management

The Active Cyber Shield helps network administrators to manage user privilege and automate control of the network. With Policy Manager, users and departments can be segregated into different groups with specific access to websites, applications and cloud services made visible via clear, concise reporting. With Web Filter and Application Control, the administrator can identify applications that could pose an exfiltration threat to the data on the network. For example, if an employee is known to have attempted to transfer files or share files, the administrator can block or flag Dropbox or file sharing applications.

Reporting is Key

The Active Cyber Shield Reports application brings all the tracking and monitoring of events, users, and traffic on the network together into fully dynamic, interactive reports––with drill-down capabilities into specific users’ details and events, including web page visits, downloads, blocked pages, attempted access to files, and more. Administrators can set up custom, conditional alerts to be notified when an unwanted action occurs. It’s easy to create any type of report or use one of the 250 default reports to get visibility into and control over all activity on the network.

Put the Active Cyber Shield by EZ TECH ASSIST on Your Team

There is no single solution to the problem of insider threats. Complex issues require a multifaceted approach, including defining Acceptable Use Policies and monitoring their enforcement. Data security and network security must go hand-in-hand with employee education.

The Active Cyber Shield Firewall is your MVP for network monitoring and reporting, giving you insight into all of your traffic. With a simple user interface and affordable price point, the Active Cyber Shield Firewall can help your organization maintain its security both on the inside and outside of the network. Get started today with the Complete Package––the most comprehensive solution and best value for your organization.

Whether there is a network slow-down, complaint about a hostile work environment, or an employee engaging in illegal activity, network administrators need to immediately identify the who, what, where and when.

The Active Cyber Shield provides advanced reporting to give you all the information you need to quickly identify and resolve issues, whether network or personnel related. Our tools show network activity in real-time, and document activity through daily reports that can be scheduled and automatically sent to the appropriate stakeholders.

…network administrators need to immediately identify the who, what, where and when.

Single-click Visibility

With one click, view all user network activity in the session viewer. To focus in a specific area, each Active Cyber Shield app has its own real-time event log and historical reports. Report columns are also customizable, so you decide the level of detail you need to see. For automatically running and distributing reports, you define when to save a report and which stakeholders to automatically send it to.

View Search Activity

The Active Cyber Shield gives you all the information needed in real-time…through a single pane of glass.

Save Time and Effort

When it comes to incident response, the Active Cyber Shield gives you all the information needed in real-time or historical data to conduct forensics for network activity. Everything is accessible through a single pane of glass, saving you hours when compared to other solutions that require you to access separate appliances, log in, run separate reports, and then correlate the disparate information on your own.

Today’s home networks are more complex than ever before. The exponential increase in devices that can be interconnected is never-ending. Laptops, chromebooks, tablets, smartphones, your friends’ devices joining the Wi-Fi…it doesn’t stop there. Now with home automation and the internet of things (IoT), home security systems, appliances, pools & spas, HVAC, music & podcasts, and TV and gaming are all connected to the internet.

Visibility and Control

The biggest challenge facing home networks isn’t necessarily even security, though that is an issue that continues to grab headlines. It’s the lack of visibility into and control over what’s happening on your network. This is where the Active Cyber Shield can help. Unlike today’s home Wi-Fi routers, the Active Cyber Shield Firewall logs traffic for rich, robust reporting into every facet of what’s happening online: sites your kids are visiting, neighbors jumping on your wireless network, and your newest IP-enabled gadget phoning home. the Active Cyber Shield Firewall allows you to create rules for managing access to websites, applications, and content based on criteria like device, user, time of day, day of week and more. You can see the effect of those rules through drill-down reports that can be monitored via the 360° Dashboard, a single pane of glass view into what’s happening on your network.

Select a Subscription Plan that suites your business needs.

Up To 25 Devices

Active Cyber Shield
$89/month
  • 2 Ethernet Ports – Ideal for Small Office environment. Additional Ethernet Ports are available for Office environments that also provide DMZ and Guest WiFi Services
  • Gateway Cyber Security Protection for all of your Office Networked Devices, such as Computers, Laptops, Tablets & Smart Phones
  • Firewall Protection, Intrusion Prevention, Content Filtering
  • Virus Blocker, SPAM Blocker, Phishing Blocker, Malicious Ad Blocker, SSL Inspector
  • 24 X 7 Active Monitoring & Real-Time email Alerts
  • Free Overnight Hardware Replacement provided during your subscription period
  • Unlimited email Technical Support
  • No Hardware or Software to Purchase
  • Additional Modules & Options Available when configuring your Active Cyber Shield subscription

Up To 50 Devices

Active Cyber Shield
$135/month
  • 2 Ethernet Ports – Ideal for Small Office environment. Additional Ethernet Ports are available for Office environments that also provide DMZ and Guest WiFi Services
  • Gateway Cyber Security Protection for all of your Office Networked Devices, such as Computers, Laptops, Tablets & Smart Phones
  • Firewall Protection, Intrusion Prevention, Content Filtering
  • Virus Blocker, SPAM Blocker, Phishing Blocker, Malicious Ad Blocker, SSL Inspector
  • 24 X 7 Active Monitoring & Real-Time email Alerts
  • Free Overnight Hardware Replacement provided during your subscription period
  • Unlimited email Technical Support
  • No Hardware or Software to Purchase
  • Additional Modules & Options Available when configuring your Active Cyber Shield subscription

Up To 75 Devices

Active Cyber Shield
$169/month
  • 2 Ethernet Ports – Ideal for Medium Size Office. Additional Ethernet Ports are available for Office environments that also provide DMZ and Guest WiFi Services
  • Gateway Cyber Security Protection for all of your Office Networked Devices, such as Computers, Laptops, Tablets & Smart Phones
  • Firewall Protection, Intrusion Prevention, Content Filtering
  • Virus Blocker, SPAM Blocker, Phishing Blocker, Malicious Ad Blocker, SSL Inspector
  • 24 X 7 Active Monitoring & Real-Time email Alerts
  • Free Overnight Hardware Replacement provided during your subscription period
  • Unlimited email Technical Support
  • No Hardware or Software to Purchase
  • Additional Modules & Options Available when configuring your Active Cyber Shield subscription

Up To 100 Devices

Active Cyber Shield
$236/month
  • 2 Ethernet Ports – Ideal for Medium Size Office. Additional Ethernet Ports are available for Office environments that also provide DMZ and Guest WiFi Services
  • Gateway Cyber Security Protection for all of your Office Networked Devices, such as Computers, Laptops, Tablets & Smart Phones
  • Firewall Protection, Intrusion Prevention, Content Filtering
  • Virus Blocker, SPAM Blocker, Phishing Blocker, Malicious Ad Blocker, SSL Inspector
  • 24 X 7 Active Monitoring & Real-Time email Alerts
  • Free Overnight Hardware Replacement provided during your subscription period
  • Unlimited email Technical Support
  • No Hardware or Software to Purchase
  • Additional Modules & Options Available when configuring your Active Cyber Shield subscription