EOH Perimeter Firewall

A perimeter firewall is seen as the first and most critical component of ensuring network security. High levels of protection are achieved by securing the network at the perimeter in this way. Additional security is gained by including an Intrusion Prevention Service (IPS) for protection against malicious attacks.

The EOH Perimeter Firewall solution is built with high levels of redundancy and fail-over protection. Constant monitoring and management allows the system to deal with any changes or evolving threats.


Reduced security expenses through outsourcing

The EOH Perimeter Firewall solution allows you to outsource your network security management, thereby reducing the expenses you would incur by maintaining and reporting on a mixture of on-site solutions.

EOH NS staff configures and maintains the firewall on your behalf from a control centre. Trained engineers are available 24 hours a day.


Pre-emptive network security combined with rapid response

IPS is a pre-emptive approach to network security that identifies potential threats and responds to them swiftly. It has the ability to take immediate action, based on a set of rules established by the network administrator.

The IPS solution has the ability to protect your network from the threat of both new and as yet unknown threats and vulnerabilities. It provides high levels of security, triggering alerts based on a customisable database. This enables the service to stop attacks that evade conventional host-based systems, and provides immediate response to fast spreading threats.


How your company will benefit

  • Comprehensive protection
    The EOH Perimeter Firewall solution contains a library of over 4000 IPS signatures. It features the latest anomaly inspection, deep packet inspection, full content inspection, and activity inspection engines, proactively updated daily.
  • Flexibility
    Control of all attack detection methods to suit the most demanding security applications.
  • Ease of administration
    User-based authentication, through internal domain controllers or active directories, allows IT administrators to apply policies to different user groups. By integrating with the firewall the same policies will apply for all users.
  • Information and insight
    The reporting component gives network administrators a comprehensive view of network usage and security information. Reports can show Internet line usage and the individuals responsible, as well as the use of specific Internet protocols. IPS reports on malicious activity, attacks by date, and the top types of attack.


Knowledge Centre

For the latest articles click here.