10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2017
Zoom product LOGO_gateprotect Firewalls

gateprotect Firewalls

LOGO_gateprotect Firewalls

gateprotect Firewalls

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Our firewalls were specifically developed to meet the requirements of SME, large companies and operators of critical infrastructures. Every company, regardless of its size, will find the products needed to protect their network in our portfolio. They are made in Germany and are developed in accordance with German standards for quality and data security. We pursue a strict no-backdoor policy. This means that our products are free of hidden access points, which could be exploited by attackers or external organizations.

Unified Line

We developed the Unified Line for the specific requirements of small companies which need an easy-to-use solution to protect their office IT against cyberthreats from the Internet. These firewalls provide easy handling of all UTM functionalities needed around the office, including antivirus, antispam, web filter and blacklisting.

The innovative eGUI technology makes using the firewall and modifying rules a simple and intuitive process, allowing all employees to operate the firewall – even if they lack profound IT knowledge. Users can efficiently set up various network features like VPN connections or VLANs.

In addition, the Unified Line provides network features such as traffic shaping, Quality of Service and multi-WAN load balancing. These features support companies in making the most of their bandwidth and ensure maximum performance despite the growing number of applications.

Extended Line

With the number of cyberattacks constantly on the rise, IT administrators in small and medium-sized companies have to implement increasingly elaborate security measures. At the same time, the growing number and complexity of IT applications leave IT administrators less and less time for giving IT security the attention it requires. That's why we specifically designed the Extended Line to ensure that administrators can efficiently implement IT security in their company.

Administrators themselves can define which security issues are relevant and the intuitive web-based user interface can be accessed from any workstation. This makes it especially easy to adjust the firewall to company-specific network and security settings.

With its extensive set of networking and security features, the Extended Line provides users with a high degree of protection. In addition to that, the Forensic Traffic Capture feature (FTC) helps users track and collect evidence of industrial espionage and network breaches. This is achieved by selectively recording data traffic and storing it as backup for later analysis.

Specialized Line

We designed the next-generation firewalls of the Specialized Line for complex IT environments requiring a high level of protection. They can be integrated into industrial process networks or very large office networks via their routing functionalities and the easy and fast integration of special protocols.

Additional firewalls and other network components can be securely integrated via IPsec or OpenVPN (client-to-site or site-to-site). Even complex networks can be built using Network Address Translation, VLAN handling and a policy-based routing based on different packet destinations and attributes. By means of a special zone model the data traffic in every network can be steered with a high degree of granularity.

The Specialized Line features further dedicated check mechanisms: Via the integrated SSL-proxy and depending on the applicable security regulations, administrators can examine even encrypted data flows

The state-of-the-art DPI engine (Deep Packet Inspection) enables the detection and examination of highly specific protocols. Protocol decoding allows the administrator to allow or block individual functions based on specific protocol attributes. Protocols can be quickly adapted and integrated according to customer requirements. By using the web-based Command Center, the administrator can monitor a complex array of firewalls with ease and in real-time.

BizzTrust

LOGO_BizzTrust

Browser in the Box

LOGO_Browser in the Box

R&S®SITLine ETH

LOGO_R&S®SITLine ETH

TrustedGate

LOGO_TrustedGate

gateprotect Firewalls is assigned to following product groups:

top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.