Segurança e controle de redes

Firewall UTM

BluePex® Next-Generation Firewall

Talk to a specialist

Employees are the main responsible for data leakage, 43% of companies suffered data loss due to the accidental or deliberate actions of their employees.

network control

Ransomware attacks on enterprises have increased three-fold in the world

network control 2

77% of companies admit that they had data leakage in the last year. The main cause is the kidnapping of data by attacks on the Ponemon Institute network

network control 3

Every day 6,449,438 data is stolen or lost

network control 4

20% of the small and medium business that suffered infection bankrupt

firewall

Our Solution

Block application access easily and efficiently

Block application access easily and efficiently

The new application firewall format, in addition to identifying standard behaviors, not only in the headers, but also in the packages data area, and determining what type of application was associated, is a very relevant feature as it allows not only the visibility, but also access controls operation, based on the type of application.

View the risk level in real time

View the risk level in real time

Map your network’s risk levels intelligently with a customized vulnerability management dashboard. You can identify the threats in real time.

SD-WAN: High cloud availability

SD-WAN: High cloud availability

SD-Wan (Software Defined Balancing) simplifies the matrix / branch network system and optimizes application performance over the Internet and the hybrid remote network. Provides consolidated monitoring and visibility of multiple remote network links and service providers.

Faster and always available internet connection

Faster and always available internet connection

Intelligent internet link balancing

All connections active and with high speed

All connections active and with high speed

Its corporate network keeps all active connections redundant and at high speed through compression, packet encryption, and L2TP, IPSec, or OpenVPN protocols. VPN connection between branches.

More productive employees

More productive employees

Control and block social networks and pornography with Webfilter +, control internet traffic in a way that protects the corporate network by limiting the user to only browse pages of the corporation interest. There are sites that consume internet bandwidth leaving the system slow and vulnerable. Others websites are wasting their team time.

Identify malware attack attempts before the invasion

Identify malware attack attempts before the invasion

The BluePex® UTM Firewall line has the IPS function, responsible for detecting intrusive files on the network. Malware and other viruses try to break into the network by themselves or through unintentional users. In this case the IPS function monitors the accesses and detects the attempted intrusion. Malware is automatically blocked and infected users are disinfected before entering the network.

Real-time navigation protection

Real-time navigation protection

Navigation protection does not allow site access that scatters trojans, spyware or any other type of malicious software, will prevent it from connecting and being infected.

Blocks dangerous websites and fraudulent access to prevent phishing and malware downloads.

File Protector, a protection layer that scans all downloaded files.

Behavior blocker detects new threats that are not known for the common attacks behaviorAnti-Ransomware, custom behavior monitoring prevents the ransomware before it can encrypt data.

New malware prevention

New malware prevention

Exclusive database of national and international threats, new malware and sophisticated attacks prevention through vulnerabilities like zero day.

Day-zero is an unknown vulnerability, which is used as heuristic artificial intelligence, block by dubious behavior, it sends a suspicious alert.

Internet banking Extra protection

Internet banking Extra protection

Access your bank on internet without worry, in addition to the security mechanisms that your bank already has, your browser will receive extra anti-fraud protection.

BI Reports (Business Intelligence System) page accesses mapping, data traffic, UTMs monitoring, links quality.

BI Reports (Business Intelligence System) page accesses mapping, data traffic, UTMs monitoring, links quality.

Quick setup, simplified control panel with graphics in several formats and easy to read.

Network control in your hand, exclusive feature BluePex® Firewall UTM, available in Google Play and App Store.

Intelligent IT Management

Intelligent IT Management

Centralized management in the IT environment, protection against malicious artifacts, network and site vulnerability analysis, internet link management, headquarter and branch office interconnection, IT environment inventory, search for anomalous behaviors. A single solution for unified protection management of IT environments, most importantly with graphical layout, easy to read, shows the IT professional the current security condition of your computer network, all in real time.

Know more
dashboard_unico controle_de_ameacas insight_de_redes regras_em_um_clique status_do_sistema monitor_de_links

You in control of everything

check Single Dashboard

check Threat Control

check Social Networks and Applications Insight

check One Click Rules

check System Status

check Links Monitor

Chat now with a BluePex® specialist
Schedule a demo

Download our Datasheet

Logo dos depoimentos

Group GR IT Manager.

Not only for the treatment I've always had, but also for the '360 solution', a choice that avoids hiring multiple vendors with different standards and systems for the IT infrastructure, concentrating everything on one platform."

WHAT MAKES US UNIQUE

SIMPLES, FÁCIL E INTUITIVO

SIMPLE, EASY AND INTUITIVE

DESENVOLVIMENTO PRÓPRIO

OWN DEVELOPMENT

PORTFÓLIO COMPLETO DE SEGURANÇA E CONTROLE COM SOLUÇÕES EM NUVEM

SAFETY AND CONTROL COMPLETE PORTFOLIO WITH SOLUTIONS IN CLOUD

SaaS

Saas

SUPORTE FENOMENAL ILIMITADO

UNLIMITED PHENOMENAL SUPPORT