Managed Firewall Services

Wanstor understands that fundamental shifts in the application and threat landscape, user behaviour, and network infrastructure have steadily eroded the security that traditional port-based firewalls once provided. Your users are accessing all types of applications using a range of device types, often at times to get their job done. Meanwhile, data centre expansion, virtualization, mobility, and cloud-based initiatives are forcing IT teams to re-think how they enable application access yet protect the networks they are responsible for.

Wanstor understands that the challenge businesses and not for profit organisations face around firewalls is that traditional firewall products and processes do not allow them to strike a balance between allowing and denying everything that accesses their network.

Wanstor’s firewall solutions help IT teams to address business and security risks associated with the rapidly growing number of applications traversing your network. By enabling applications for users or groups of users, both local, mobile, and remote, and protecting the traffic against known and unknown threats, IT teams can improve their security posture whilst users concentrate on growing the business in a safe IT environment.

Wanstor’s firewall solutions enable IT teams to:

Classifying all applications, across all ports, all the time: Accurate traffic classification is the heart of any firewall, with the result becoming the basis of the security policy. Today, applications can easily bypass a port-based firewall; hopping ports, using SSL and SSH, sneaking across port 80, or using non-standard ports. Wanstor helps IT teams to address the traffic classification visibility limitations that plague traditional firewalls by applying multiple classification mechanisms to the traffic stream, as soon as the firewall sees it, to determine the exact identity of application traversing your network, regardless of port, encryption (SSL or SSH) or evasive technique employed.

Integrating users and devices: Wanstor helps IT teams to create and manage security policies based on the application and the identity of the user, regardless of device or location. We believe this is a more effective means of protecting a network than relying solely on port and IP address. Integration with a wide range of enterprise user repositories provides the identity of the Microsoft Windows, Mac OS X, Linux, Android, or iOS user accessing the application. Users who are traveling or working remotely are seamlessly protected with the same, consistent policies that are in use on the local, or corporate network. The combined visibility and control over a user’s application activity means IT teams can safely enable the use of a variety of applications, no matter where or how the user is accessing it.

Protect against all threats, both known and unknown: To protect today’s modern network, IT teams must address known exploits, malware and spyware as well as completely unknown and targeted threats. This process begins by reducing the network attack surface by allowing specific applications and denying all others, either implicitly through a deny-all-else strategy or through explicit policies. At Wanstor we can help your IT team to analyse malware and malicious behaviour on the network. All threat prevention analysis uses full application and protocol context, ensuring that threats are always caught even if they attempt to hide from security in tunnels, compressed content or on non-standard ports.

Deployment and Management Flexibility: Safe application enablement functionality is available in either a purpose-built hardware platform or in a virtualized form factor. When IT Managers deploy firewalls, in either hardware or virtual form factors, they can use a centralized management platform to gain visibility into traffic patterns, deploy policies, generate reports and deliver content updates from a central location.

By partnering with Wanstor to address Firewall solution needs IT teams can benefit from:

Improved traffic visibility: IT administrators can gain a more complete picture of the application activity, the potential security impact, and make a more informed policy decision. Applications are continuously classified and as their state changes, the graphical summaries are dynamically updated, displaying the information in an easy-to use, web-based interface. New or unfamiliar applications can be quickly investigated with a single click that displays a description of the application, its behavioural characteristics, and who is using it.

Enabled applications and reduced corporate risk: Safe application enablement uses policy decision criteria that includes application/application function, users and groups, and content as a means of striking a balance between business limiting denying of all applications and the high risk alternative of allowing all applications. At the perimeter, including branch offices, mobile, and remote users, enablement policies are focused on identifying all the traffic, then selectively allowing the traffic based on user identity; then scanning the traffic for threats.

Protect Enabled Applications: Safe application enablement means allowing access to certain applications, then applying specific policies to block known exploits, malware and spyware: known or unknown; controlling file or data transfer, and web surfing activity.

Block Known Threats: A uniform signature format and a stream-based scanning engine enables IT teams to protect their network from a broad range of threats. Intrusion prevention system (IPS) features block network and application-layer vulnerability exploits, buffer overflows, DoS attacks, and port scans. Antivirus/Anti-spyware protection blocks millions of malware variants, as well as any malware-generated command-and-control traffic, PDF viruses, and malware hidden within compressed files or web traffic (compressed HTTP/HTTPS). Policy-based SSL decryption across any application on any port protects you against malware moving across SSL encrypted applications.

Block Unknown, Targeted Malware: Unknown or targeted malware is identified and analysed which directly executes and observes unknown files in a cloud-based, virtualized sandbox environment. Wanstor’s firewall solutions monitor for more than 100 malicious behaviours and the result is delivered immediately to the IT administrator in the form of an alert.

Identify Bot-Infected Hosts: Classify all applications, across all ports, including any unknown traffic, which can often expose anomalies or threats in a network. The behavioural botnet report correlates unknown traffic, suspicious DNS and URL queries and a variety of unusual network behaviours to reveal devices that are likely infected with malware.

Limit Unauthorized File and Data Transfers: Data filtering features enable IT administrators to implement policies that will reduce the risks associated with unauthorized file and data transfers. File transfers can be controlled by looking inside the file, to determine if the transfer action should be allowed or not. Executable files, typically found in drive-by downloads, can be blocked, thereby protecting your network from unseen malware propagation. Data filtering features can detect, and control the flow of confidential data patterns (credit card or social security numbers as well as custom patterns).

Control Web Usage: IT administrators can apply granular web-browsing policies, complementing application visibility and control policies and safeguarding the enterprise from a full spectrum of legal, regulatory, and productivity risks. In addition, the URL categories can be leveraged into the policies to provide further granularity of control for SSL decryption, QoS, or other rule bases.

Ongoing Management and Analysis: Security best practices dictate that your administrators strike a balance between proactively managing the firewall, whether it is a single device or many hundreds, and being reactive, investigating, analyzing, and reporting on security incidents.

Management: Each Wanstor platform can be managed individually via a command line interface (CLI) or full-featured browser-based interface. Role-based administration is supported across all management mediums, allowing IT teams to assign features and functions to specific individuals.

Reporting: Predefined reports can be used as-is, customised, or grouped together as one report in order to suit the specific requirements. All reports can be exported to CSV or PDF format and can be executed and emailed on a scheduled basis.

Logging: Real-time log filtering facilitates rapid forensic investigation into every session traversing your network. Log filter results can be exported to a CSV file or sent to a syslog server for offline archival or additional analysis.

For more information about Wanstor's IT Security Solutions, please contact us on 0333 123 0360, email us at or fill in the form below and one of our IT Security experts will give you a call back.

Fast and reliable help desk IT Support Service for your business.

Business IT advice from James at Wanstor

Contact James

To talk about this or any of your other business IT needs, please call James on 0333 123 0360.

Business IT advice from Fawaz at Wanstor

Contact Fawaz

To talk about this or any of your other business IT needs, please call Fawaz on 0333 123 0360.

Business IT advice from Rob at Wanstor

Contact Rob

To talk about this or any of your other business IT needs, please call Rob on 0333 123 0360.

Business IT advice from Karl at Wanstor

Contact Karl

To talk about this or any of your other business IT needs, please call Karl on 0333 123 0360.

Business IT advice from John at Wanstor

Contact John

To talk about this or any of your other business IT needs, please call John on 0333 123 0360.

124-126 Borough High Street London, SE1 1LB
Phone: 0333 123 0360, 020 7592 7860
Wanstor IT Services Logo
IT Support London from Wanstor