For VendorsBlog
Login
Please turn the screen for optimal content display

Compare: NG Firewall

Characteristics

Antivirus and antispyware functions

IDS/IPS availability

Functionalities

Bot protection

DDOS protection

Data Leak Prevention

Network behavior analysis support

Sandboxing support

Context-aware policy

Application level attacks protection (Application Intelligence)

Two-factor authentication (2FA)

Certificates based authentication

Available proxy modes

Management

Deployment options

Integrations

OS and hardware

  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • Decrypting SSL traffic
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • N/A
  • Application control
  • Decrypting SSL traffic
  • URL filtering
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Configuring static and dynamic routing
  • Application control
  • Decrypting SSL traffic
  • URL filtering
  • SSL VPN remote access
  • Application control
  • IPv4/IPv6 protocols
  • Hiding adresses with NAT
  • DHCP
  • IPSec Site to Site VPN tunnels
  • Stateful TCP/IP stack
  • URL filtering
  • Configuring static and dynamic routing
  • N/A
  • Reverse proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • DNS proxy
  • Reverse proxy
  • Reverse proxy
  • DNS proxy
  • N/A
  • DNS proxy
  • N/A
  • N/A
  • N/A
  • N/A
  • N/A
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • Bandwidth
  • Configuration console
  • N/A
  • Bandwidth
  • Configuration console
  • N/A
  • N/A
  • Bandwidth
  • N/A
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • High availability
  • Virtualized environment
  • N/A
  • N/A
  • Routed/Transparent mode
  • Virtualized environment
  • High availability
  • Routed/Transparent mode
  • Virtualized environment
  • Virtualized environment
  • High availability
  • N/A
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • IAM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Active Directory
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • Threat Intelligence
  • Active Directory
  • SIEM
  • AAA-servers
  • Network security policy management
  • N/A
  • N/A
  • N/A
  • N/A
  • N/A
  • Active Directory
  • Threat Intelligence
Found mistake? Write us.