Your browser either does not support JavaScript or you have turned JavaScript off.
New Enhancement

How do you stop IP threats before damages are made ?
Check it out

ZyWALL ATP Next Generation Firewall


Quản trị thông minh qua cloud,
chống lại các nguy hại không xác định

Cơ chế học máy

Trí tuệ điện toán đám mây của Zyxel (Zyxel Cloud Intelligence) xác định các tệp tin lạ từ tất cả các thiết bị tường lửa ATP, lưu trữ kết quả trong cơ sở dữ liệu và cập nhật hàng ngày cho tất cả ATP, tích luỹ các dữ liệu này thành kiến thức để liên tục cải tiến trở thành hệ sinh thái bảo mật tự phát triển nhằm thích ứng ngay với các đợt tấn công mới
Sandboxing Threat Intelligence Machine Learning

Threat Intelligence Machine Learning

Threat Intelligence Machine Learning syncs daily with all ATP Firewalls so that every ATP benefits machine learning from the cloud, both the cloud and ATP are connected as a security ecosystem that learns together, so it can strengthen its defense and stay immune to new unknown attacks. The cloud never stops expanding and evolving, by merging multiple databases with Threat Intelligence Machine Learning, its growing malware intelligence allows ATP Firewalls to detect malware in real-time.

Sandboxing

Sandboxing là một vùng độc lập trên cloud chứa các tệp chưa xác định nhằm phân loại các phần mềm độc hại mới mà các cơ chế bảo mật tĩnh thông thường không thể phát hiện được, nhằm đảm bảo chống lại các tấn công qua lỗ hổng zero-day

Cơ chế bảo vệ nhiều lớp

ATP Firewall is designed with multi-layer protection against multiple types of threats from in and out. Sandboxing, Malware Blocker, Reputation Filter, and Intrusion Prevention block external attacks while Application Security and Web Security empower you to restrict users' inappropriate application usage or web access, all together safeguarding your network without any unattended gaps.

Hạn chế các hành vi trực tuyến nguy hiểm

Chặn các nguy hại đến bảo mật

  • ATP

  • Geo
    Enforcer

    Geo Enforcer

    ATP can restrict access from high-risk countries and can know the source or destination of attacks with GeoIP address translation for geographic mapping.

  • Web
    Security

    Web Security

    Web Security includes Botnet Filter and Content Filter features, covering both URL and IP checking with cloud-synced categories that can evolve with the growing cloud database.

  • Application Security

    Application Security

    Application Security includes Application Patrol and Email Security features, not only does it block malicious attacks, but it also provides managerial control to optimize application traffic, or block undesired applications.

  • Cloud
    Sandboxing

    Cloud Sandboxing

    Sandboxing contains all unknown files or user patterns in isolation, then emulates the programs to run and identifies whether or not they are malicious. If its malicious, Sandboxing will update this new malware information via Threat Intelligence Machine Learning.

  • Malware
    Blocker

    Malware Blocker

    Anti-Malware is empowered by daily synchronization via Threat Intelligence Machine Learning, so ATP malware protection is lifted from a local scope to a comprehensive cloud level with global sharing synergy. The new Cloud Query further adds real time hash check service, delivering quicker, better, stronger malware defense.

  • Intrusion
    Prevention

    Intrusion Prevention

    The IDP (Intrusion Detection and Prevention) feature runs deep inspection to block exploits and attacks from vulnerable applications, ensuring uncompromised security.

  • Reputation Filter

    Reputation Filter

    Quickly check connected IP addresses with an always up-to-date cloud database of IP addresses with threat activities. This allows lower hardware utilization, freeing up more resources for administrator to confront common cyber attacks without much effort.

  • Internet

ATP can restrict access from high-risk countries and can know the source or destination of attacks with GeoIP address translation for geographic mapping.
Web Security includes Botnet Filter and Content Filter features, covering both URL and IP checking with cloud-synced categories that can evolve with the growing cloud database.
Application Security includes Application Patrol and Email Security features, not only does it block malicious attacks, but it also provides managerial control to optimize application traffic, or block undesired applications.
Sandboxing contains all unknown packets or user patterns in isolation, then emulates the programs to run and identifies whether or not they are malicious. If its malicious, Sandboxing will update this new malware information via Threat Intelligence Machine Learning.
Anti-Malware is empowered by daily synchronization via Threat Intelligence Machine Learning, so ATP malware protection is lifted from a local scope to a comprehensive cloud level with global sharing synergy. The new Cloud Query further adds real time hash check service, delivering quicker, better, stronger malware defense.
The IDP (Intrusion Detection and Prevention) feature runs deep inspection to block exploits and attacks from vulnerable applications, ensuring uncompromised security.
Quickly check connected IP addresses with an always up-to-date cloud database of IP addresses with threat activities. This allows lower hardware utilization, freeing up more resources for administrator to confront common cyber attacks without much effort.

Cloud Query

Cloud Query levels up ATP malware defense. Quicker response. Wider coverage.
When an unknown file appears, Cloud Query quickly checks the file ID in the cloud database to check if it is malicious within seconds. This maximizes your network traffic by consuming minimal network resources while maintaining a strong malware coverage with multiple-sourced cloud database that has billions of malware data and still growing every minute. Cloud Query also accelerates new malware intelligence that circulates throughout Zyxel Security Cloud, which strengthens every ATP's malware protection capability.

Dịch vụ phân tích và báo cáo

SecuReporter giám sát, phân tích và báo cáo các mối nguy hại trong mạng sau đó khuyến nghị các hoạt động bảo mật cần thiết. Đây là một dịch vụ cloud biến các log dữ liệu thành báo cáo phân tích hoàn chỉnh.
Tìm hiểu thêm

Tìm hiểu thêm