Active Cyber Shield Appliance [4 Ports]

The Active Cyber Shield is more than just a Firewall. It takes the complexity out of network security—saving you time, money and frustration. Get everything you need in a single, modular platform that fits the evolving needs of your home or business without the headaches of multiple point solutions. Stop viruses, malware, hacking attempts, phishing schemes and other exploits before they enter your network, never reaching any of your devices.  Get a handle on every rogue application, encrypted web request, malware distribution point, drive-by malvertising attempt, and rash of spam. Protect your home or business from the high cost of recovering from a cyber-attack, or the expensive cost in buying hardware and software needed to protect your systems, not-to-mention, the cost of maintaining your IT infrastructure.

SKU: ACSR4L4 Category: Tag:

Additional information

Configuration Assurance

Our engineers will pre-configure your Active Cyber Shield appliance to your specifications. There is a one-time cost associated with your Active Cyber Shield subscription and thats because every Active Cyber Shield appliance is carefully tested and configured specifically to fit your cybersecurity needs. This is to ensure proper configuration, optimal security settings and ease of installation of your Active Cyber Shield security appliance.


The Active Cyber Shield is capable of performing many tasks, all of which are modular by design. Modules included are Firewall Protection, Intrusion Prevention, Content Filtering, Virus Blocker, SPAM Blocker, Phishing Blocker, Malicious Ad Blocker, Captive Portal, SSL Inspector, Tunnel VPN and much more. An engineer will provide you with further details of these modules when they configure your unit.


Additional Layer of Cyber Security Protection from your home or office's main Internet Connection (also known as Gateway) for up to 500 devices on your Network, such as Computers, Laptops, Printers, Copiers, Tablets, Point of Sales equipment, IP Phones & Smart Phones


Your active Cyber Shield comes standards with 4 Ethernet Ports – Making ideal for Home, Small to Medium size office environments with the ability to expand and add services such as DMZ's and Guest WiFi Services


At any time, throughout your subscription period, should your Active Cyber Shield fail, for what ever reason, we will provide you with a hassle free overnight replacement of your unit at no extra charge.


The Active Cyber Shield comes ready to go straight out of the box. Our engineers configure the unit to your specifications before it is delivered to you, so the guesswork of setting up the device is eliminated. Your service includes 24 X 7 Active Monitoring your Active Cyber Shield, Active updates of Virus and Malware definitions, Real-Time email Alerts with unlimited email Technical Support.

Q & A

1. Where do I install my Active Cyber Shield?
The Active Cyber Shield can be installed directly between your Internet modem and your network. Let your engineer know what your requirements are, so all you will need to do when you receive your appliance is plug it in and turn it on. It's that simple.

2. Do I need to get rid of my existing firewall?
No, the Active Cyber Shield can provide you with an additional layer of security by placing it in front or behind your current firewall.

3. Do I need to install more software on any of the devices on my network, such as my computers?
No, there is no additional software required. All the devices on your network are automatically protected by the Active Cyber Shield.

4. Does the Active Cyber Shield help with compliance requirements?
Yes, the Active Cyber Shield helps meet compliance for FISMA, NERC, NIST, FIPS, and several other state and county rules.

5. Do I have the ability to monitor and fine-tune performance?
Yes, the Active Cyber Shield provides you with a wide array of capabilities, such as:

– Policy control and Active Directory/LDAP integration to control Internet access
– Captive portal to identify every user on the network and to control which resources can be accessed
– Policy and content filtering for remote devices
– Prioritize mission-critical applications that directly affect the level of care provided to patients
– Prevent network slowdowns caused by any individual or group of users and applications
– Layer 7 application awareness to identify all incoming application traffic regardless of port destination
– HTTPS traffic inspection
– Secure, turnkey VPN connections for remote workers

and much more.