WatchGuard XTM 2050 1Y NGFW Suite WG019229 プリント

製品コード
WG019229
ページ / 2
It is not good enough anymore to believe a traditional fi rewall will stand 
against the attacks and accidents that threaten to compromise business 
systems. Enterprises today need to defend corporate resources, prevent 
data theft, securely connect users, enforce acceptable use, and prevent 
network attacks, all while having visibility into what is happening. What 
does it take to stay on top of security? A next-generation fi rewall (NGFW) 
that “understands” real-world corporate network traffi  c in order to reliably 
secure it against hackers, malware, network attacks, intrusion attempts, 
data theft, and other cybercrime, while securely connecting offi  ces, 
remote and virtual employees, and providing real-time and historical 
visibility into network, security, and user events.
WatchGuard’s NGFW products provide true line-speed security inspection 
on all traffi  c and support multi-gigabit packet fi ltering throughput. In 
addition, the NGFW line provides application control; connects offi  ces 
via unique Drag and Drop VPN; connects people via SSL and IPSec 
VPN; and gives the enterprise unparalleled visibility into real-time and 
historical user, network, and security activities. With WatchGuard’s NGFW, 
businesses can defi ne, enforce, and audit strong security and acceptable 
use policies, resulting in increased employee productivity and less risk to 
critical intellectual property or customer data.
What is a next-generation fi rewall? 
Key Next-Generation Firewall Characteristics:
   High-performance security inspection that blocks attacks and unwanted traffi  c 
without hindering mission-critical Internet usage 
   A platform for network traffi  c inspection and network security policy enforce-
ment, with the following minimum features:
   
-
   Standard  Firewall Capabilities: 
 Packet Filtering
 Network Address Translation (NAT)
 Stateful Protocol Inspection
 Virtual Private Networking (VPN)
   
-
   Integrated Network Intrusion Prevention (IPS)
   
-
   Application Awareness and Control
   
-
   Additional Intelligence: Directory integration to tie security policies to users 
and groups; cloud-based reputation services to stop traffi  c from dangerous 
sources
   
-
   Real-time and historical visibility into user, network, and security activity
Benefi ts of WatchGuard Application Control: 
Granular control
 – Due to the varied ways that people can use applications, 
it’s critical to control one or more aspects of an application while being able to 
disallow other aspects of it. Examples of this are allowing the use of Windows Live 
Messenger for instant messaging but not for fi le transfer, or allowing access to 
Facebook but not to Facebook games. 
Breadth of application signatures
 – Extensive list of supported applications 
that are updated and maintained. WatchGuard application signatures are auto-
matically updated without requiring an upgrade of the entire NGFW appliance as 
new applications are released and application behaviors change. 
Ability to identify encrypted applications
 – WatchGuard Application Control’s 
unique behavior analysis functionality can discover even well disguised applica-
tions that attempt to bypass security measures by encrypting application data 
and traffi  c as it traverses the Internet. 
Next-Generation Firewall 
For The Enterprise
Businesses today need more than a traditional firewall to protect their assets. As business 
collaboration increases and employees increasingly use the multitude of tools available to 
them – many of which were never designed for business use – enterprise data security and 
compliance requirements become a challenge. People work in a way that’s faster, easier, 
and more intuitive – whether they’re on the road, in the office, at an airport, or at home. And 
applications that weren’t designed for business can – and do – bypass traditional firewalls 
and enter a network, regardless of how carefully the IT staff may have tried to lock down the 
environment. This means it is essential that businesses implement security tools designed 
with today’s environments in mind.