Managed Firewall Solutions
Protection from external threats by an experienced partner.
![](https://dev.adept.co.uk/wp-content/uploads/2022/04/AdEPT_Nebula_Image_3.jpg)
Features
• Both centralised and edge firewalls (hosted and/or onsite)
• Control access to and from the Internet, between sites and other network
• Intrusion detection / intrusion prevention systems (IDS / IPS)
• End user & infrastructure patching
• Dual factor identification
• Web and email filtering
• Anti-virus
• End user protection
• Centralised user security management
![](https://dev.adept.co.uk/wp-content/uploads/2022/06/Emailfiltering_2.jpg)
Benefits
• Incorporates continuous threat protection, providing protection against known malware and malicious websites
• Provides high performance and protection for SSL encrypted traffic
• Virtualised domain with advanced threat policies provides an easy-to-deploy solution for distributed sites
• No requirement for on-site firewalls, although can just as easily complement local deployment and control
• Virtualised domain per customer within AdEPT’s resilient Nebula core
• Management and support by AdEPT skilled and trained staff
• Delivered as part of an AdEPT Nebula WAN environment
![](https://dev.adept.co.uk/wp-content/uploads/2022/06/Managed_firewalls.jpg)
Advanced Options Available with Fortinet
Fortinet’s Unified Threat Management (UTM) is available for enhanced protection, with services including web and email filtering, anti-virus, intrusion detection and protection, and application control.
FortiGate IPS includes:
• Deep inspection for advanced threats, botnets, zero days and targeted attacks on the network
• Independent third-party validation to demonstrate superior detection performance
• Innovative security processor (SPU) technology for high-performance network throughput and deep security inspection
• Seamless integration – appliance or cloud service – with world-class sandboxing for advanced threats
• Special security controls for web servers and applications, including cross-site scripting and SQL injection
• Data protection controls to prevent sensitive data exfiltration