loader image
LOGO

UNIFIED THREAT MANAGEMENT

Comprehensive Managed Security NAT Total Security offers unified threat management that includes functions such as Firewall (ATP + IPS), Proxy, Application Control, Antispam, Web Application Firewall, Site-to-Site Tunnels, Authentication Agents, WIFI Controller, Reports, etc; All these functionalities are managed from a single management point that allows you to have significant savings in infrastructure, licensing, administration and support of the different devices that you will have to use to cover the same security areas.

SAFETY AND CONTROL FUNCTIONS

NAT TOTAL SECURITY interprets incoming and/or outgoing network traffic using various security and control features. Among them are IPS or IDS, which monitor the network to detect malicious activities that try to take advantage of certain vulnerabilities. It also features Sandbox, a mechanism that creates an sandbox from the operating system to mitigate failures or vulnerabilities and prevent their propagation, and Threat Protection (ATP), a subset of security solutions designed to protect the organization’s data against complex cyber attacks, such as malware or phishing.
With an easy-to-use configuration wizard that allows for easy configuration of environment-specific rules, Intrusion Prevention provides flexible control. More than 34,000 signature detections, including heuristic signatures for port scans, allow you to effectively monitor and block most suspicious requests.

TRAFFIC CONTROL

NAT TOTAL SECURITY integrates a Firewall that is responsible for controlling network exchange that exists between users, servers and the Internet, constantly scanning and maintaining network traffic safely by applying its various filters.
Drawing the line between internal and external networks, Firewall filters traffic based on IP address, protocol, and port, allowing administrators to designate which systems and services (HTTP, FTP, etc.) are publicly available. The Firewall can be run as a transparent bridge to complement an existing Firewall and allows you to control inbound and outbound access to specific IPs and ports.

CONSTANT MONITORING AND REPORTS

NAT TOTAL SECURITY has a Sniffer to monitor, capture and analyze in real time the data packets that pass through a network, without redirecting or altering them. In order to create advanced reports and logs in real time, for specialized analysis in security and operational continuity.

24X7 SUPPORT

NAT TOTAL SECURITY has constant attention to meet your requests and/or generate the necessary reports, providing relevant information regarding the security you are having with the implementation of this system.

DIFFERENT CONFIGURATIONS

NAT TOTAL SECURITY allows you to configure browsing filters, block browsing, create exclusions to web pages, block incoming and/or outgoing network traffic to entire countries. Likewise, it allows users who access the system to be identified, registering their IP, taking into account that various groups and profiles can be created that have different browsing permissions according to their needs and/or requests.

REMOTE CONNECTIONS

NAT TOTAL SECURITY allows you to connect remotely from any device, thanks to the fact that we have various communication and security protocols that guarantee communication by authenticating and/or encrypting each packet, such as: Ipsec, SSL, Wireguard, HTML5 Portal and L2TP.

SECURITY INTEGRATIONS

NAT TOTAL SECURITY integrates with 3 cloud antiviruses, such as Bitdefender, Kaspersky and Sophos, which allow us to know in detail what types of infections have existed, in order to avoid spreading, future infections or their recurrence.

FREE SETUP AND DEPLOYMENT​

The configuration and implementation is free and part of the service provided. New-Age Technology is contractually responsible for the security of its NETWORK, this implies that in the implementation process we carry out a complete survey and ordering of the entire corporate NETWORK in order to implement the service efficiently and correctly, understand the NETWORK and defining it allows us to determine what is the best security strategy.

BALANCER, FAILOVER Y MIXEO​

Mixeo allows you to add the upload and download megabytes of the routers connected to the appliance. WAN Balance, this focuses on defining the output of traffic by various routers, so that none of these is saturated with the requests of the various equipment. High Availability, this configuration allows traffic to never stop because if one link goes down the other continues to work. It is worth mentioning that this configuration has two configurations, these being: Active – Active and Active – Passive.

SUPPORT FOR 32 INTERFACES

NAT TOTAL SECURITY allows you to connect up to 32 interfaces between routers and switches, to which network traffic will be constantly scanned.

WEB CONTROL AND FILTERING

Web Filters help administrators ensure web and content security across the entire network. Easily and quickly create policies to block access to pornography, gambling, videos, social media, shopping sites, or other undesirable or inappropriate content and apps. Allow, block, flag or alert by category to easily configure rules that meet your criteria. With Web Filter, you can easily monitor or control searches on popular search engines, including Google, YouTube, Ask, Bing, and Yahoo. You can also apply secure YouTube searches as well as records searches, giving you an unprecedented degree of visibility and control—ideal for content-sensitive environments like schools, public libraries, and social service organizations.
Allowing access to inappropriate content can reduce productivity, create distractions, or even lead to legal action. Web Filter is a fast, easy, and effective way to make sure your users don’t abuse your web usage policies.

APPLICATION CONTROL

Application Control helps you deal with productivity drains, bandwidth hogs, and protocol-agile applications used for filter bypassing. It works in conjunction with Web Filter, SSL Inspector, Bandwidth Control, and Policy Manager to give you the tools you need to enforce your usage policy and see where your bandwidth dollars are being spent. Ensure your users can access mission-critical cloud-based applications (like CRM, ERP) while keeping recreational or inappropriate applications off the network.

Application Control performs Deep Packet Inspection (DPI) and Deep Flow Inspection (DFI) of network traffic, enabling it to accurately identify thousands of common applications such as social networking, P2P, instant messaging, streaming video, usage file sharing, business applications and much more. Just check “block” for anything you want to stop, and Application Control will take care of the rest. If you need a higher degree of control, you can use the Integrated Rules Engine TM to create custom rules to target more complex traffic patterns.

FREQUENTLY ASKED QUESTIONS, ANSWERS FAST

New-Age Technology data centers are equipped with backup uninterruptible power supplies (UPS) and diesel generators, and are designed to ensure constant power availability for up to 48 hours during an indefinite power outage. In addition, there are redundant heating, ventilation and air conditioning (HVAC) systems, networks and UPS. Physical security is ensured through the use of high fences, 24/7 security personnel, and video surveillance with 90-day archiving. To access it is necessary to pass a biometric scan of the geometry of the hand and present a proximity card.

We have never really had problems with service outages, however, to ensure the Business Continuity of our clients, all our nodes are connected in an optical ring. The information is replicated to the next fastest responding DC in less than 15 minutes and everything continues as normal. We have our own nodes:AMÉRICAS: Washington (USA), New York (USA), Chicago (USA), Metro Kanzas (USA).
EUROPA: París (France).
PAISES BAJOS: Amsterdam.
ALEMANIA: Frankfurt am Main, Metro Karlsruhe , Munich.

To arrive at this answer, we must first mention that Backup tasks can be performed hot (working hours) or cold (non-working hours). Obviously it is more advisable to do it outside working hours so that it does not consume the bandwidth that users are surely using. In any case, if it is required to run the Backup hot, for example, because the Manager only works until noon and I need to backup his laptop before he leaves; In this case, we can assign a specific bandwidth to the task, thus avoiding saturated upload consumption (Post, Drive, online collaboration tools, etc.)

The data is stored encrypted in AES-256bits, which means that only the client with a username and password can access the information stored in our Cloud. You don’t need to be physically on your LAN to manage your backups: the console is 100% Cloud. We have privacy and confidentiality clauses with their respective penalties in accordance with the data protection law (DLP).

STRATEGIC PARTNERS
OF INTERNATIONAL BRANDS

FOLLOW US ON:

NEW-AGE TECHNOLOGY
IN THE WORLD

© 2022, New-Age Technology Inc. All rights reserved

contact us

Our commercial advisors will contact you shortly.

STRATEGIC PARTNERS OF INTERNATIONAL BRANDS

tE CONTACTAMOS A LA BREVEDAD

contáctanos

Nuestros asesores comerciales se comunicaran con usted a la brevedad.

SOCIOS ESTRATÉGICOS DE MARCAS INTERNACIONALES

GRACIAS POR REGISTRARSE

UN ASESOR COMERCIAL SE COMUNICARÁ A LA BREVEDAD CON USTED