EDGE SECURITY
Preventing confidential data leaving your organisation is an important part of your company's defences, ensuring data is not lost to competitors or confidential data released to the public domain. These defences are deployed both on security gateways and also at the local host level and comprises various technologies including web and email content filtering, endpoint full disk encryption, removable media encryption and anti bot protection.

CHECK POINT
Check Point Security Appliances are integrated hardware devices that are pre-installed with essential software blades to produce a comprehensive, turnkey security gateway solution
​
Check Point Security Gateway Software Blades are independent and flexible security modules, which can be combined to build a custom security gateway solution. Software Blades include Firewall, VPN, IPS, Anti Malware, URL Filtering and Anti-Bot

CISCO
Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defence (FTD) are the core operating systems for the Cisco firewall Family. It delivers enterprise-class firewall capabilities for ASA/FTD devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA/FTD Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.

JUNIPER
The Juniper SRX Series Security Systems are purpose-built firewall/VPN security systems designed for large enterprise, carrier, and data center networks, integrating firewall security, VPN security, DoS and DDoS protection, and traffic-management functionality, in low-profile modular chassis. Built around third-generation security ASIC and distributed system architecture, these VPN firewall security systems offer excellent scalability and flexibility, while providing a higher level VPN firewall security system through the JunOS custom operating system.

FORTINET
A new next-generation firewall (NGFW) approach is needed for today’s distributed networks. With the data center no longer the main location for applications, there must be new capabilities.