Next Generation Solutions

DDoS, Enterprise Security Management, Next Generation Firewalls

RioRey's DDoS protection platforms allow you to reduce the direct and indirect costs of damaging DDoS emergencies. In fact, RioRey detect and mitigate DDoS attacks automatically so that few attacks ever become the kind of emergencies that can potentially overwhelm network staff. On the positive side of the equation, many of RioRey's customers convert DDoS protection into a revenue opportunity by providing incremental protection for their own clients.

The threat of DDoS Attacks

If network or website downtime is not an option, you must have an effective DDoS defense strategy. Distributed Denial of Service (DDoS) attacks can cripple your business. The fallout from a DDoS attack can result in lost revenue, customers, and credibility. DDoS defense systems based on traditional security measures such as firewalls, intruder detection systems, increased bandwidth and network security staff are not robust solutions. Experts agree that only a dedicated DDoS protection platform can effectively counter the threat of DDoS.

Key Product Features

  • Algorithmic-based (not rules or anomaly based)
  • Detects and mitigates DDoS attack traffic in two minutes or less
  • Automatic detection/filtering--- no analyst intervention required
  • No signatures required
  • Adapts to attacker changes in real-time without analyst intervention
  • No other hardware required; works in heterogeneous network environment. RioRey is agnostic regarding other equipment or defense systems in the network
  • Technology based on multi-level algorithmic architecture and does not require Netflow information
  • RioRey operation is transparent to networking layer protocols and all flow and link information passes through
  • No deep packet inspection or decryption required
  • RioRey represents the new generation of dedicated DDoS defense

RioRey Taxonomy of DDoS Attacks

RioRey has designed a RioRey Taxonomy Chart of DDoS Attack Types that provides a language and structure for classifying and understanding the evolving and complex world of DDoS.

Download PDF

FireMon provides enterprise security management software that gives companies deeper visibility and tighter control over their network security infrastructure.

FireMon's integrated solutions suite enables customers to analyze and identify network risk, proactively eliminate those vulnerabilities and strengthen security throughout the organization, and reduce the cost of security operations and compliance.

FireMon Solutions Haniya Technologies Provides Services For

Security Manager is an innovative firewall management solution that empowers firewall administrators and security managers with the tools to manage change, clean up legacy policies, and comply with industry and local standards.

Security Manager Features Include:

Access Path Analysis
Attack Path Identification
Audit Log
Change Notifications
Change Reporting
Customized Analysis
Deep Network Risk Visibility
Expired Rules Tracking

Firewall Complexity Scoring
Firewall Policy Optimization
HA Consistency
Hidden Rule Identification
Insight
Multi-tenant Permissions
Pre-change Compliance
PCI Analysis

Risk Measurement

Risk Recommendations
Risk Scoring
Rule and Object Usage
Rule Documentation
Security Topology
Traffic Flow Analysis

Making changes to firewall policies can be difficult and time-consuming. FireMon® Security Manager's Policy Planner can reduce the effort required to make firewall changes while ensuring that the right changes are made.

Policy Planner is a web-based system for collecting firewall change tickets, recommending rule changes, and allowing for audit validation. Policy Planner enables IT security organizations to gain significant efficiency by automating the change process and giving firewall administrators tools to make accurate and compliant rulebase changes.

Risk Analyzer introduces a new way to measure risk. Instead of calculating threats and vulnerabilities, risk is measured in hypothetical attacks, or attack scenarios. The enterprise defines the attack scenarios — a threat source and assets at risk from the threat — that matter most. Example scenarios include: partners using a VPN to access ordering systems, geo-political threats wanting to deface corporate web messaging, and internal users direct access to financial data.

With your risk scenarios defined, the exposure to each can be measured by Risk Analyzer. The system's dashboard provides an overview of each scenario in terms of its access to assets and potential vulnerabilities.

"Through 2018, more than 95% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws."

Gartner Research Note

One Brand of Firewall is Best Practice for Most Enterprises, November 2012

Palo Alto Networks next-generation firewalls allow you to safely enable applications and strengthen your security posture across the entire organization with firewall policies that use business-relevant elements such as the application identity, who is using the application, and the type of content or threat as network access decision criteria.

At the gateway, you can reduce your threat footprint by blocking a wide range of unwanted applications and then inspecting the allowed applications for threats – both known and unknown. In the datacenter - traditional or virtualized application enablement translates to ensuring only datacenter applications are in use by authorized users, protecting the content from threats and addressing virtual infrastructure security challenges. Your offices and remote users can be protected by the same set of enablement policies deployed at the headquarters location, thereby ensuring policy consistency.

Watch Video

Solutions Overview

Palo Alto Networks next-generation firewalls enable you to rapidly adopt and safely use applications of all types, Enterprise 2.0 or otherwise, while protecting your organizations’ network resources. Port-based firewalls cannot see or identify these applications and UTMs, simply collapse functions into a single box without addressing the application control challenges. Palo Alto Networks next-generation firewalls have fundamentally changed the nature of the perimeter firewall – bringing applications, users, and content into firewall policy – enabling you to say "yes," to safe enablement of new applications and technologies, while mitigating the associated business and security risks.
Palo Alto Networks next-generation firewalls enable you to, for the first time, deploy flexible and adaptable network security into your data centers. With highly available, high-performance platforms and implementations, Palo Alto Networks next-generation firewalls enable you to maintain availability and response time of your data center applications, while ensuring compliance, increasing visibility, and protecting themselves from an increasingly sophisticated threat landscape.
Palo Alto Networks next-generation firewalls enable you to, for the first time, deploy flexible and adaptable network security into your virtualized data centers. With highly available, high-performance platforms and implementations, Palo Alto Networks next-generation firewalls enable you to maintain availability and response time of your data center applications, while ensuring compliance, increasing visibility, and protecting themselves from an increasingly sophisticated threat landscape.
Palo Alto Networks next-generation firewalls enable you to deploy application, user, and content-based visibility and control not only to your headquarters users, but also to your enterprise branch offices and remote users. Palo Alto next-generation firewalls are available in platforms specifically engineered for deployment at enterprise branch offices, and GlobalProtect establishes a "logical perimeter," ensuring consistent policy and network security for users wherever they may be located.
Palo Alto Networks next-generation firewalls enable you to, for the first time, take a strategic, systematic approach to protecting your organization from an increasingly sophisticated attacker. Today's threats are multi-faceted, targeted, often unique to a particular organization, and use applications, encryption, and tunnels effectively. Palo Alto Networks next-generation firewalls first limit the attack surface by only allowing desirable applications, for the appropriate users and groups. Those applications can then be limited to certain functions and types of content. Allowed applications and content can be scanned for threats – even if SSL encrypted, on non-standard ports, or tunneled inside an application. For unknown threats, our WildFire technology enabled organizations to, by policy, send unknown executable content to a cloud-based "sandbox" environment for analysis. All of this adds up to the most comprehensive approach to enterprise network threat prevention on the market.