Protect your business from the high cost of recovering from a cyber-attack, or the expensive cost in buying hardware and software needed to protect your systems, not-to-mention, the cost of maintaining your IT infrastructure.Shalom Cohen
Simply Powerful Network Security
The Active Cyber Shield takes the complexity out of network security—saving you time, money and frustration. Get everything you need in a single, modular platform that fits the evolving needs of your organization without the headaches of multiple point solutions.
We create policies based on your business needs quickly and easily. Our database-driven reports—the most comprehensive and detailed in the industry—give you visibility into exactly what’s happening on your network.
Security, insight, control: you’ve got it covered.
Comprehensive Security at the Gateway
Our Firewall gives you more protection at the gateway in a single solution—saving you time and money. Tackle malware, hacking attempts, phishing schemes and other exploits before they ever reach your users.
Get a handle on every rogue application, encrypted web request, malware distribution point, drive-by malvertising attempt, and rash of spam. Our Firewall puts you in control of what your users can access, install and use.
Deep Analysis and Insights
See who’s doing what when on your network. Leverage database-driven reports for real-time and historical insights—all delivered on-box without the need for a separate appliance. Get valuable insights at a glance with a customizable, widgetized dashboard. Or, share template-driven, customizable reports via email with each of your stakeholders.
Superior Connectivity and Performance
Meet the challenges of a remote workforce, branch offices and guest Wi-Fi. Keep users and data safe regardless of location or level of access. Balance competing priorities, ensure Quality of Service (QoS) and maximize uptime while saving the organization money.
Active Cyber Shield gives you more protection at the gateway in a single solution – saving you time and money. Tackle malware, hacking attempts, phishing schemes and other exploits before they ever reach your users.
Drawing the line that separates internal and external networks, Firewall filters traffic based on IP address, protocol and port, which enables administrators to designate which systems and services (HTTP, FTP, etc.) are publicly available.
Firewall can be run as a transparent bridge to complement pre-existing firewall and allows you to control inbound and/or outbound access to specifics IPs and ports.
Intrusion Prevention blocks hacking attempts before they reach internal servers and desktops. The Active Cyber Shield’s pre-configured signature-based IPS makes it easier for administrators to provide 24/7 network protection from hackers.
It minimizes annoying false positives and ensures that signatures are always current with automatic updates. With an easy-to-use setup wizard allowing simple configuration of rules specific to each environment, Intrusion Prevention provides flexible control. Over 34,000 signature detections, including heuristic signatures for port scans, enable you to effectively monitor and block most suspicious requests.
Bad guys are working tirelessly to develop malware that they let loose on the Internet. That’s why you need a team of anti-malware experts working around the clock to defend you against the latest threats. Virus Blocker leverages signatures from Bitdefender, the leader in speed and efficacy, whose threat lab experts work 24-hours a day, 365-days a year to identify emerging threats. Heuristic models provide an additional layer of protection against zero-day threats, and real-time updates with no system downtime ensure that your network is always protected. Identifies and blocks zero-day threats, viruses, worms, Trojan horses, botnets, unknown malware, and new infections.
Identity thieves are becoming increasingly sophisticated with email and website spoofs that are nearly impossible to discern from the real thing. Phish Blocker protects users from email phishing attacks and fraudulent pharming websites.
Protection for multiple protocols, including HTTP and SMTP, ensure that signatures are always current with automatic updates.
Get a handle on every rogue application, encrypted web request, malware distribution point, drive-by malvertising attempt, and rash of spam. Active Cyber Shield puts you in control of what your users can access, install and use.
Eliminate annoying advertisements and decrease page load times with Untangle’s Ad Blocker. Based on the open source project AdBlock Plus, Ad Blocker lets you easily block ads at the gateway without installing browser plugins.
Prevent malware and scam links through banner ads while reducing traffic on the network.
Do you have a handle on your network traffic? If you’re only choosing to block or allow websites by URL, that may not be enough. Today, you need the ability to control traffic at the application level. Enter Application Control.
Application Control helps you wrangle productivity drains, bandwidth hogs and protocol-agile apps used for filter bypass. It works in concert with Web Filter, SSL Inspector, Bandwidth Control and Policy Manager to give you the tools you need to enforce your use policy and see where your bandwidth dollars are being spent. Make sure that your users can access mission-critical, cloud-based apps (like CRM, ERP) while keeping recreational or inappropriate apps off the network.
More and more Internet traffic is being encrypted using HTTPS, which creates a huge blind spot for firewalls. It compromises their ability to analyze traffic, identify threats or handle policy violations.
SSL Inspector solves this problem. Whether it is driven by concerns about personal privacy, or the rise of web applications like Salesforce, Netflix and Facebook, the amount of encrypted Internet traffic has exploded. SSL Inspector puts Active Cyber Shield in the middle of the encrypted traffic, with the ability to decrypt and analyze the data as it passes through.
80% of all email is either spam, phishing or email fraud, causing each of your users to waste an average of 100 hours per year cleaning out their inbox. For even a single user, Spam Filter quickly pays for itself in reclaimed productivity, not to mention reduced frustration and actual financial losses. Arm yourself and fend off the criminals who are clogging your inboxes and wasting your time.
Block porn, gambling, videos, social networks, shopping sites and other inappropriate content or applications from entering your network. If users turn off safe search, you can have Web Filter turn it right back on, automatically. Just as Application Control manages access based on the application type, Web Filter manages access based on the type of content on the site.
There are more than 1 billion websites on the Internet, so how can you realistically evaluate each one to filter out offensive or inappropriate content? No worries, we do that for you! If you combine Web Filter and Policy Manager, you can enable more flexible access based upon user groups (e.g. teachers versus students) and during different times (lunch time or weekends). For example, you might allow teachers to access social networks any time, but students can only access them during lunch break or after school. Setting up and managing filter rules is quick, easy and effective with Web Filter.
Web Monitor enables administrators to categorize web site requests, giving them complete visibility to web traffic.
Web Monitor has 140 categories and 500 million sites categorized. As sites are visited, they are dynamically categorized using cloud-based lookups for real-time categorization. Additionally, Web Monitor categorizes HTTPS traffic using SNI and/or any certificate information.
Web Monitor has the best web categorization and analytics available and is perfect for organizations that just need to monitor, not control, web activity. In order to control web traffic (block, flag), Web Filter is required.
Tackle the challenges of a remote workforce, branch offices and guest WiFi. Keep users and data safe regardless of location or level of access.
Captive Portal allows administrators to block internet access for users until they complete a defined process. With Captive Portal you can require users to view or accept an Acceptable Use Policy before accessing the internet (e.g. public WiFi). You can also configure Captive Portal to be displayed only at certain times.
Enable custom integrations from acknowledging Acceptable Use Policies (AUP) to accepting payments for wi-fi hotspot access.
If you want to securely extend your network to remote users, or knit together branch offices into a single virtual network, IPsec VPN is the tool you need. Working remotely—from home, a remote branch, or even a café—is increasingly popular, but it creates serious risks for network administrators and users. These days, users expect access to everything from their phone or laptop, wherever they are. If they access the Internet directly, they are exposed to Wi-Fi hackers, viruses, and more. IPsec VPN solves all of that by routing them through the Active Cyber Shield where all of the same policies and protections are provided via a secure encrypted tunnel directly between your network and the user.
OpenVPN enables administrators to provide secure remote access to the internal network to remote users and sites. Active Cyber Shield’s intuitive GUI makes it easier to configure basic settings through a setup wizard.
You can generate custom certs for each client, and easily distribute pre-configured client software via email.
See who’s doing what when on your network. Set policies by user, group, device, time and more. Get complete visibility into and control over traffic.
Leverage the power of your directory service to provide you with more granular policy creation, management and reporting. If you use Microsoft Active Directory, RADIUS or the Active Cyber Shield Local Directory, Directory Connector dramatically simplifies and enhances the value of Policy Manager. Policy Manager inherits user and group information, enabling simplified management and greatly enriched logging and reporting.
Define and manage network privileges based on username, groups, time, day, protocol and much more. Policy Manager works with other apps to help you create rules that leverage the full power of the Active Cyber Shield’s features.
User-Based Rights: Personalize access based on IP address or group. Combine Policy Manager with Directory Connector, and give have access to social media to teachers, but not students. Combine Policy Manager with Web Filter and you can filter anything remotely offensive for visitors, while authenticated users have more liberal access.
Time-Based Rights: You might choose to allow your employees to access games or shop online only during lunch time, after hours or on the weekends. Or you can allow students to check their social networks during their lunch break. Policy Manager enables you to easily fine-tune time and calendar-based policies. Policy Manager makes Bandwidth Control better too. You might choose to remove bandwidth caps after-hours, when business-critical functions won’t be impacted.
The Reports app provides administrators with detailed views of the traffic on their networks. These reports can be automatically emailed, viewed online, or broken down into CSVs for archiving locally or remotely to Google Drive (requires v12+ and Directory Connector). The Reports app runs within Active Cyber Shield and does not require a separate appliance. The email reports are a simple overview of traffic with a breakdown in HTML format, while more granular viewing of the data can be done through a web browser.
Active Cyber Shield’s reports are database-driven, allowing you to drill down into any aspect of the traffic on your network. The reports are fully dynamic, interactive, and customizable. Slice and dice based on hosts, users, policies, domain, or literally any column on any table. Additionally, the Reports app enables you to create alert rules. Alert rules are evaluated on all events logged in the database and will log and/or email the administrator when a given condition is met. This enables administrators to stay on top of threats, policy breaches, system status and more.
Solutions by Issue
- Next-Generation Web Filtering
- Internet of Things
- BYOD & Open WiFi
- Mobile Policy Enforcement
- Insider Threats
- Incident Response
- Protecting Your Home
However, as the internet evolved, so did the types of websites and applications employees accessed both on-site and away from the office. As functionality rapidly moved to the server, it sparked the meteoric rise in cloud-based applications and changed the way content would be delivered over the web.
Network administrators need next-generation web filtering to effectively stop the internet traffic they don’t want.
This change exposed the inflexibility of legacy web filters and rendered their basic block/allow rules ineffective. Today, websites and applications proactively hop ports to improve their reliability and speed. Increasing functionality makes some parts of a website or application mandatory for one group of users, while for others it is not. And with more traffic continuing to go through HTTPS, it increases the amount of traffic legacy web filters are unable to see that automatically gets passed through.
But with the rise of connected devices comes the increased security risks that lie within the devices. Most of these connected devices are not built with security as a priority feature. Small businesses rely on many connected devices like printers, scanners, TVs, and video equipment to run their businesses––all of which are connected to the Wi-Fi router.
Unfortunately, most Wi-Fi routers are also not built with security in mind. In early 2016, The Wall Street Journal looked at the security capabilities of the top 20 consumer routers and found that only six of those had up-to-date ﬁrmware at that time, and just two of them had good password processes. Some small businesses (as well as home offices) don’t have corporate firewalls or unified threat management (UTM) systems in place and are relying on these consumer-level routers that aren’t providing enough protection.
The Threat of Hackers
As with any new device or software, hackers love to find the vulnerabilities and exploit their findings. In 2015 alone, cybersecurity experts discovered major flaws in some connected baby monitors, IP-enabled toys and even a connected car. Hackers are not just focused on corporate businesses anymore; home and small-office networks are seen as soft targets that may provide a way in to larger targets, like larger business partners, client companies or corporate employers.
Protect Your Small Business
Many small businesses don’t have the resources or budget to have IT professionals on staff or invest in enterprise-level network security systems. There are a few things small business owners can do to increase security and reduce the risk of hackers gaining access to the network.
Ransomware is defined as a type of malware that creates a restriction of some type on the user’s computer. In order to remove the restriction, the user must pay a ransom. This form of crimeware is unique in that it tries to coerce the user into directly paying the criminal––effectively turning the malware itself into a way for the attacker to profit. Over the past five years, ransomware has become more and more widespread because of the initial success of cybercriminals in convincing victims to pay to recover their files.
Hackers often use trojan horses to spread ransomware. A trojan horse (or simply, “trojan”) is any program which disguises itself in order to get a user to install or execute it. Trojans often masquerade as system or software updates, macros or other software add-ons. In reality, they carry malicious payloads that can have any number of undesirable effects: giving the hacker privileges on the computer via a “backdoor”; destroying files or corrupting disks; taking control over computing resources to use some or all of them as part of a “botnet”; or even stealing personally identifiable information like name, address, credit card information or other sensitive data directly or by “keylogging”. In the case of ransomware, the trojan hides the malicious code and tricks the user into executing it. The ransomware then is able to infect the host computer (and possibly all mounted disks and network shares).
Notorious ransomware like Cryptolocker, CryptoWall and Locky all work in similar ways. These three widespread exploits all attack files on the victim’s computer and encrypt them with a private key known only to the hacker. This makes the files useless to the victim; they can no longer access the contents without the key. To obtain the key and decrypt the files, the victim must follow the criminal’s instructions to make payment and obtain the decoder.
How is Ransomware Spread?
Ransomware can be distributed through the same vehicles as other malware: software downloads from websites, attachments to emails, and even malicious ads (known as “malvertising”) delivered over online ad networks.
Organizations often utilize a hybrid WAN consisting of MPLS and backhauled traffic while seeking lower-cost options for connectivity. This complex network topology can be difficult to manage, and security often becomes an afterthought—leaving the network edge open to attack.
Software-defined WAN solutions help organization make use of different routes to the internet: across service providers, physical locations, and networks. There are a number of different criteria necessary for an SD-WAN solution to meet:
- WAN optimization
Solutions can include software, hardware and over the top (OTT), cloud-based services. Furthermore, overseeing WAN edge functions at scale requires centralized, cloud-based management tools.
Organizations can benefit from SD-WAN in a several ways. It gives administrators more control over the network infrastructure while reducing capital and operational expenditures. Furthermore, it enables them to take full advantage of the benefits of cloud-based software services, improving agility and responsiveness without the need for installed solution refresh cycles.
Network administrators need a solution that can handle all devices—whether business-managed or personal.
The Need For Open Wi-Fi
In addition to BYOD deployments increasing, the way devices connect to the network is also in a state of transition from ethernet to wi-fi. With wireless connectivity a standard capability in laptops, cell phones, tablets and other devices, effectively deploying BYOD requires businesses to provide open wi-fi access for these personal devices.
For network administrators to support both BYOD and open wi-fi, they need a solution that can handle all devices–whether business-managed or personal–that connect to both the wired and wireless network.
Supporting BYOD and Open Wi-Fi
The Active Cyber Shield makes it simple for businesses to support BYOD and open wi-fi by identifying all users through a Captive Portal and if available, Directory Connector. Once identified, Untangle ensures security and enforces policies so each individual user has the right access to network resources. Unidentified users can be put into a generic user group to limit their network access, preventing any security risks or bandwidth impacts they would otherwise have on the network. This ensures employees can freely use their personal devices they are comfortable with on a secure, reliable business network.
The Active Cyber Shield ensures security and enforces policies so each individual user has the right access to network resources.
Protecting the Endpoint
Along with protecting the network, protection at the endpoint is important as devices can be brought on-site with previous malware and other inherent risks like USB file transfers, rootkit/jailbreaking vulnerabilities, and personal information on the device. To handle the endpoint requires clear rules of engagement and communication across stakeholders in IT, legal and finance. Once a strategy is in place, businesses can comfortably deploy BYOD and open wi-fi access knowing the network is secure and the business stakeholders are ready.
Whether you’re provisioning mobile devices to your employees or running a 1:1 program for your K-12 students, you need to be able to control what happens to those devices even when they’re off your network. Mobile devices are inherently promiscuous, connecting via cellular and wifi networks that may or may not have sufficient security protocols in place. You work hard to keep threats off devices connected to your local network; be sure those same devices aren’t left exposed when they’re in the wild.
Mobile Policy Enforcement
The Active Cyber Shield’s Mobile Policy Enforcement can help. Using Xauth over IPsec VPN, it’s simple for schools and businesses to provide VPN access to Untangle. Xauth is natively supported across all major operating systems (Windows, Mac, iOS and Android), from the phone to the desktop. That means no third-party or client software installation needed. Regardless of where the device is located, it will get all the benefits from the same policies and protections as users behind an Untangle appliance on your local network. If you’re looking for the quickest way to enforce policy across all your devices, no matter where they are or how they connect to the Internet, NG Firewall is the solution for you.
K-12 and 1:1 Programs
If you’re issuing mobile devices to students, you may be putting your CIPA compliance at risk. You need to ensure that students stay safe no matter where they’re connecting from – whether at home, the library or elsewhere. You also need to be sure that the devices you’ve entrusted them with are kept secure from malware and other threats. How can you manage this without dealing with installing software on every device?
Active Cyber Shield Firewall can help. By ensuring mobile devices connect to the Internet via forced full tunnel VPN using Xauth, you can have the same network policies you’ve put in place on campus be in effect no matter where those devices wander.
The Inside Threat
Identifying which employee, business associate or trusted third party can pose a threat can be extremely challenging when the risk can come from anyone: a current or former employee, contractor or business partner with access to the system, network or data. Disgruntled employees might seek revenge on the company that they perceived to have wronged them, or an undervalued worker might feel a sense of entitlement and sabotage the company.
With many ways to extract data or create backdoors into the systems, nothing is safe. An insider may have the ability to impact the confidentiality, integrity or availability of the company’s systems, networks or data. Solutions designed solely to prevent outside attacks cannot combat the risks coming from within the organization.
Network Control and Management
The Active Cyber Shield helps network administrators to manage user privilege and automate control of the network. With Policy Manager, users and departments can be segregated into different groups with specific access to websites, applications and cloud services made visible via clear, concise reporting. With Web Filter and Application Control, the administrator can identify applications that could pose an exfiltration threat to the data on the network. For example, if an employee is known to have attempted to transfer files or share files, the administrator can block or flag Dropbox or file sharing applications.
Reporting is Key
The Active Cyber Shield Reports application brings all the tracking and monitoring of events, users, and traffic on the network together into fully dynamic, interactive reports––with drill-down capabilities into specific users’ details and events, including web page visits, downloads, blocked pages, attempted access to files, and more. Administrators can set up custom, conditional alerts to be notified when an unwanted action occurs. It’s easy to create any type of report or use one of the 250 default reports to get visibility into and control over all activity on the network.
Put the Active Cyber Shield by EZ TECH ASSIST on Your Team
There is no single solution to the problem of insider threats. Complex issues require a multifaceted approach, including defining Acceptable Use Policies and monitoring their enforcement. Data security and network security must go hand-in-hand with employee education.
The Active Cyber Shield Firewall is your MVP for network monitoring and reporting, giving you insight into all of your traffic. With a simple user interface and affordable price point, the Active Cyber Shield Firewall can help your organization maintain its security both on the inside and outside of the network. Get started today with the Complete Package––the most comprehensive solution and best value for your organization.
The Active Cyber Shield provides advanced reporting to give you all the information you need to quickly identify and resolve issues, whether network or personnel related. Our tools show network activity in real-time, and document activity through daily reports that can be scheduled and automatically sent to the appropriate stakeholders.
…network administrators need to immediately identify the who, what, where and when.
With one click, view all user network activity in the session viewer. To focus in a specific area, each Active Cyber Shield app has its own real-time event log and historical reports. Report columns are also customizable, so you decide the level of detail you need to see. For automatically running and distributing reports, you define when to save a report and which stakeholders to automatically send it to.
View Search Activity
The Active Cyber Shield gives you all the information needed in real-time…through a single pane of glass.
Save Time and Effort
When it comes to incident response, the Active Cyber Shield gives you all the information needed in real-time or historical data to conduct forensics for network activity. Everything is accessible through a single pane of glass, saving you hours when compared to other solutions that require you to access separate appliances, log in, run separate reports, and then correlate the disparate information on your own.
Visibility and Control
The biggest challenge facing home networks isn’t necessarily even security, though that is an issue that continues to grab headlines. It’s the lack of visibility into and control over what’s happening on your network. This is where the Active Cyber Shield can help. Unlike today’s home Wi-Fi routers, the Active Cyber Shield Firewall logs traffic for rich, robust reporting into every facet of what’s happening online: sites your kids are visiting, neighbors jumping on your wireless network, and your newest IP-enabled gadget phoning home. the Active Cyber Shield Firewall allows you to create rules for managing access to websites, applications, and content based on criteria like device, user, time of day, day of week and more. You can see the effect of those rules through drill-down reports that can be monitored via the 360° Dashboard, a single pane of glass view into what’s happening on your network.
Solutions by Industry
- Federal Government
- State & Local Government
- Hospitality & Retail
- Banking & Financial
- Higher Education
- K-12 Schools
- Branch Networking
To make sure that network security doesn’t take a backseat to other budget needs, Active Cyber Shield provides nonprofit organizations with the same powerful, easy-to-use solutions that it sells to businesses, but with special pricing to fit those tighter budgets.
Active Cyber Shield simplifies network security and internet connectivity across distributed organizations. Active Cyber Shield Firewall and Command Center can help companies address security, bandwidth utilization, application performance, centralized management—all while controlling costs.
Reasons why to subscribe now
A Firewall alone cannot fully protect your network. Hackers have gotten far too creative with the way they attack your network. That is why you need to implement a new Cybersecurity strategy that will protect you right from your network’s entry point. Don’t wait for your device’s software to report a security breach, by then it’s too late. Implement all your security apps from this point, protecting all the devices connected to your network.
The Active Cyber Shield protects your entire network from a centralized point, which includes any networked computers, laptops, point of sales, tablets, smartphones, printers, copiers and scanners.
You do not have to invest in expensive hardware or software, the Active Cyber Shield comes with everything you need to protect your network at a low monthly subscription cost.
You never need to maintain or update your equipment as we do it proactively, 24×7 for you. You get the latest virus and malware updates automatically.
There are no costly maintenance contracts, you’re covered under your subscription, so we replace any failed equipment at no extra charge.
No additional software needs to be installed on any network devices. As long as they are connected to your network, the Active Cyber Shield will protect it.
The Active Cyber Shield’s powerful Virus Blocker leverages signatures from Bitdefender.
The Active Cyber Shield’s powerful web filter will protect all devices from malicious and harmful sites. Block porn, gambling, videos, social networks, shopping sites and other inappropriate content or applications from entering your network.
Get real-time alerts of any malicious activity discovered.
Get daily reports about your network activity.
Get unbeatable support as provided by EZ TECH ASSIST.
Get the protection you need today!
We make it simple to choose a subscription that suites your business needs.
Our Firewall is simply powerful, and we believe that subscribing should be just as straightforward. You can customize a solution to fit your needs, then complete your subscription online. We’re standing by to help if you need assistance.