Order PT NGFW
Submit the form and our team will contact you as soon as possible
PT NGFW detects more than 1 500 applications and allows you to create and enforce security policy rules to enable, inspect, and shape desired applications as well as block not only unwanted applications but also unwanted user activity inside it (like file and folder uploads or downloads)
Up to 300 Gbps throughput of FW + Application inspection + User Identity
Data processing is moved from Linux Kernel to the User space, so PT NGFW can process data at 150Gbps and even more.
Proprietary traffic analysis algorithms designed to accurately identify more than 1 500 applications on a network with no performance degradation.
Build-in high-performance IPS engine (a patented Positive Technologies solution) provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds with high security effectiveness and a low false positive rate.
Compact desktop and 2U rackmount network appliances with extremely powerful Intel® Scalable Gen4 processors for demanding network applications. Additional redundancy features are also available, such as hot-swappable fans-modules and multiple Ethernet module bays for flexible port configuration.
The dual hot-swappable power supply guarantees continuous and normal PT NGFW appliance operation even if one power supply fails.
High technology and reliable hardware with adaptable modules up to 100 Gbps and 5 x hot-swap OCP NICs
The threat landscape keeps changing. Cyber security keeps moving forward. Game on. PT Expert Security Center team have participated in more Russian cybercrime scene investigations than any other company in the Russian market. We have been uncovering APTs, malware, ransomware, and underground cyber-criminal trends across the world. As research-led practitioners, we seek out the most challenging cyber security problems we can find. And we love to solve them. Now we are ready to protect your business with our own IPS and Application Inspection Signatures, Threat Intelligence feeds, and comprehensive knowledge of Tactics, Techniques, and Procedures bad actors use, we’ve been getting doing a security research for many years especially for high-performance networks with severe security risks. We are protecting our clients for more than 20 years and we know how to win the Cyberwarfare.
Submit the form and our team will contact you as soon as possible