Unified Threat Management
Server security solutions today are far too complex and expensive for your business.
Fusion Dynamics supplies an integrated family of applications that helps simplify and consolidate all the products and systems required, in one package.
Our solution can be integrated into your existing infrastructure or replace it seamlessly. Already have an anti-spam appliance that you like and just want to use Fusion Dynamics’ solution for Web Filtering, reporting and VPN? No problem. You choose what you need.
Spam is the bane of a businesses’ existence. It can not only bring viruses onto your network, but it can take over your computers and send spam to other computers.
And it impacts you in other ways. According to a recent study, the cost of spam messages to U.S. companies – in terms of productivity and the equipment, software and manpower to combat it – was upwards of $10 billion in 2004.
So the key is to stop spam before it stops you.
Our powerful Spam Blocker protects you with top-notch spam scanning and blocking at the edge of your network – before it can do damage or slow you down. Using the latest technologies, Spam Blocker transparently scans for spam, marks messages and intercepts emails. It requires no alteration of your network’s mail configuration and is constantly updated to guard against any refinements in trickery or techniques that senders create to get around other solutions.
According to an industry study, at least 90 percent of large enterprises and 50 percent of small companies in the world now monitor and filter their employees’ internet access.
The primary reasons company’s use Internet filtering and monitoring is to block inappropriate content (44%), control productivity (32%) and preserve network bandwidth (23%).
You will be enabled to define the policies for hosts, domains and files types, you can block access to inappropriate sites, including access to sites such as Face Book. You can also view a big picture of the kind of web browsing behaviour occurring on your network.
Protocol control covers a broad set of applications, such as Instant Messaging, Peer to Peer activity, online games and streaming media that can clog your network, reduce productivity, and infect computers with spyware, malware, and viruses.
These applications are extremely aggressive and will sneak out on ports used for other vital network traffic such as web and email, making it nearly impossible to control them with firewall rules.
Protocol Control takes a different approach to log and/or block these applications using their signatures. This allows you to lock down the unwanted activity.
Unlike desktop solutions, Fusion Dynamics’ solution sits at the network gateway and automatically updates signatures so you don’t have to worry about whether or not your users have disabled their client software in any way. Protection on the most common email protocols SMTP, IMAP, and POP and protection for webmail and file transfer via HTTP and FTP protocols.
Reports and event logs show you what viruses are being blocked on the network.
The battle with spyware is constant, and its infection is insidious – you may not even know you have it until its doing real damage to your network. Weird settings, an abundance of pop-up ads (even when you’re not on the Web), clicking hyperlinks that don’t work and a sluggish system are just a few of the symptoms to look out for.
Stop spyware, adware and malware before it makes it to your network – and find already infected computers with a powerful spyware blocker. We use a wide range of cutting-edge technologies, including URL blocking, cookie blocking, ActiveX blocking of bad vendors and subnet logging, to protect you from attacks and infections.
Maintain the highest level of protection for you and your employees with our Identity Theft Blocker. This application protects your network against “phishing” attacks – emails that direct users to fraudulent websites with the intent to steal personal identity information, credit card information and more.
Identity Theft Blocker marks phishing emails and puts them in a user’s quarantine. Transparent, powerful and easy to use, it requires no alteration of your network’s mail configuration.
Most hackers are looking for computer networks that they can hijack and exploit. They cast wide nets using automated programs that sniff out exposed networks. This makes small businesses, with more limited IT budgets, particularly vulnerable.
Our Intrusion Prevention system intercepts attacks in their tracks. Working transparently on your network, this innovative application uses thousands of signatures to detect, block and log intrusion attempts, using industry-standard rules.
Prevent Denial-of-Service (DoS) attacks – and keep your network focused on legitimate uses.
“Unfriendly” machines earn bad reputations and are limited, dropped and rejected. Attack Blocker can also quickly identify unauthorized use of network resources and stop those resources from being allocated to unauthorized users.
The Firewall is the most basic security element to hide your network from the outside and control all external access points (also known as ports). It lets you block unwanted activity and protect your network.
We will build a list of rules that meets your unique needs – control traffic by protocol, source address or port, destination address or port, and set default actions.
Firewall evaluates traffic travelling across your network by applying your rules until a block/pass verdict is reached or a default action is taken.
VPN is an SSL-based virtual private network. Supporting a range of platforms, including Windows 2000/XP and higher, Linux, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Solaris, OpenVPN can tackle all of your VPN needs. Powerful security and control features and intuitive set-up make this an ideal solution for remote access to your business.