For VendorsBlog
Clavister Virtual Core Series

Add to comparison

Clavister Virtual Core Series

Clavister Next Generation Firewalls combine enterprise class firewalling with application recognition and advanced threat protection features that puts you back in control of your network.

Features of product

Проблемы Problem Solving
  • No IT security guidelines
  • Non-compliant with IT security requirements
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors

About Product

The Clavister Virtual Core Series is a set of network security products designed for virtual and cloud-based security, offering excellent performance, powerful security features and resource efficient. The Clavister Virtual Core Series offers you the same powerful security features you find in our hardware-based products, but for your virtual environment. Easily deploy your Clavister Virtual Core Series in market-leading VMware or KVM virtualization environments. Its minimal footprint and extremely low resource requirements makes the Clavister Virtual Core Series an optimal solution for all types of virtual and cloud-based network security solutions.

True Application Control

Clavister Virtual Core Series fully supports True Application Control – one of our next-generation firewall security services.

Enabling True Application Control will help you to manage applications used in your network more safely. With added security you lower your overall risk exposure and as a result, costly security incidents and downtime can be avoided. It also gives you valuable insight in which applications are used by which user, and can therefore prioritize business critical application and increase your overall business productivity.

True Application Control not only recognize more application and data, it understands how these application behave and can act immediately on malicious behavior.

With its unique support for Deep Application Content Control (DACC) technology, our application control can perform in-depth analysis and control of application content with higher degree of control. DACC enables you to understand and visualize Skype IDs, SQL queries, Facebook chat text, VoIP call information and much more.
Clavister SSL Inspection for Application Control provides a high performance and non-intrusive way to identify and control even SSL encrypted applications. True Application Control is included in the Clavister Security Subscription (CSS) service.

Content Security Services

Having a regular firewall is not enough to prevent attacks from happening on your network. As attacks become more severe and the threat landscape becomes more dynamic, additional measures need to be in place to protect your network. Clavister offers best-of-breed content security services, including Intrusion Detection and Prevention System, networkcentric Anti-Virus from Kaspersky Labs, and Web Content Filtering to add an additional security layer to your firewall. These content security services protect your network from advanced threats your firewall alone cannot stop. The Content Security Services are included in the Clavister Security Subscription (CSS) service.

User Identity Awareness

User Identity Awareness (UIA) provides granular visibility of user identity, and enables you to control network access at the user level. The User Identity Awareness together with our True Application Control functionality will provide you with an extremely powerful and versatile tool for granular visibility and control of “who-does-what-and-when” in your networks. You will have the ability to pinpoint user access to applications across both wired and wireless networks regardless of connecting device.



Antivirus and antispyware functions
IDS/IPS availability

SSL VPN remote access;Application control;IPv4/IPv6 protocols;Hiding adresses with NAT;DHCP;IPSec Site to Site VPN tunnels;Configuring static and dynamic routing

Bot protection N/A
DDOS protection
Data Leak Prevention N/A
Network behavior analysis support
Sandboxing support N/A
Context-aware policy N/A
Application level attacks protection (Application Intelligence) N/A