Endpoint Firewall

Endpoint Firewall

Endpoint Firewall Protection 

Anti-virus software alone will not stop threats

Protecting internal and external 'endpoint' devices






Solution Features & Benefits




> Protecting workstations, laptops and servers against viruses, worms, malicious and ransomware hackers


> Enables IT administrators to strike a balance between security, performance, productivity while simplifying endpoint security administration


> Compliance check: systems failing compliance can be directed to remediation


> Completely transparent and invisible to the user


> Context aware


> Centrally managed administration console enables centralised policy and rules based management for all your endpoints


> Stateful IP filter with powerful rule sets that allow detailed control of all inbound and outbound traffic on all adapters and network interfaces with automatic protection against malformed and illegal network packets

> Deep-packet inspection engine monitors incoming and outgoing traffic for network protocol deviations, suspicious content that signals an attack, or security policy violations


> Ability to inspect encrypted and clear text network traffic


> Application white listing


> Zero day vulnerability, polymorphic, advanced threat, stealth attack detection and alerting


> Behaviour based protection based on application scoring for more accurate false positive prevention


> Alerts fed to global SOC teams which review global threats 24/7 and ensure your endpoints are protected


> Central policy management of remote endpoint devices


> Can co-exist with other personal firewall products, if needed







Every Device Should be Protected


With the current threat landscape and the mobile workforce, remote office and endpoint devices extending the perimeters of organisations’ computing infrastructures, endpoints have become a primary target for exploits and attacks.

A threat often first infects a single laptop while outside the network perimeter, and then when the laptop connects to the internal network, the threat spreads to other endpoints. Endpoint firewalls can be leveraged not only to block internal network attacks from breaching any endpoint connected to the network, but also to prevent these threats from ever leaving the initially infected endpoint.

Threat protection on endpoints is critical to protect from blended threats and to inhibit outbreaks. To be effective, it must encompass more than a firewall. Network threat protection should include a blend of state-of-the-art protection technologies, including intrusion prevention and sophisticated capabilities (anti-virus, anti-spyware), to control network communications

Servers and clients are both vulnerable to attacks from any machine that can

communicate with them, whether an attacker exploits a weakness in the applications or from a vulnerability in the underlying operating system. Network firewalls and other security devices provide some protection from external threats, but not from threats sourced from within the same network. In order to protect machines in the same network or security zone from each other, every device should be protected by its own firewall.

Device Firewall protects Windows workstations and servers from these attacks by limiting the traffic that an endpoint can send or receive. 




Also See

- IDS / IPS systems

- Malware / anti-virus spyware software

- Device control

- Network access control

(discovers and evaluates endpoint compliance status, provisions the appropriate network access, provides automated remediation capabilities, and continually monitors endpoints for changes in compliance status)





Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk