You can achieve "internal measures" that are possible because of the security switch.
The security switch TiFRONT can implement three internal measures: "threat prevention," "spread prevention," and "network visualization." It detects and prevents suspicious activities, such as a PC infected with malware acting as a stepping stone for unauthorized access to other PCs or file servers connected to the network, or being scanned by the network. Additionally, it identifies terminals infected with malware and turned into zombie PCs, raises alerts for suspicious activities, and prevents the spread of infection by isolating them from the network. 【Features】 - Can be implemented without changing the layout - Detects, blocks, and releases attacks on the access network - Immediate blocking upon detection through integration with entrance and exit measures - Visualization of the internal network - Streamlining of operational management For more details, please contact us or download the catalog.
Inquire About This Product
basic information
【Features】 ○ Equipped with a linked function that immediately identifies and reliably blocks devices upon detecting a threat (when using FortiGate for internet entry and exit measures). ○ Visualization of the internal network → Displays logs of threat attacks such as DoS attacks and ARP spoofing, as well as device threats, in statistical information like graphs. ○ Integrated authentication function → Achieves endpoint security by combining individual authentication methods such as IEEE802.1X RADIUS authentication, web authentication, and MAC address authentication. ○ Stacking function → Manages up to 8 TiFRONT devices virtually as a single unit. ○ Loop prevention function → In the event of a LAN loop failure, automatically shuts down the affected ports quickly, not only between TiFRONT ports but also through island hubs. ○ LAN cable redundancy function → Automatically switches to a standby cable in case of LAN cable disconnection, ensuring high reliability and redundancy. ● For more details, please contact us or download the catalog.
Price information
Please contact us.
Delivery Time
※Please contact us.
Applications/Examples of results
For more details, please contact us or download the catalog.
catalog(1)
Download All CatalogsCompany information
The company was established in 1994 as a provider of IT-related product imports, sales, and technical support. We mainly offer distribution and technical support for cutting-edge computer network-related products and information communication security-related products from the United States. Recognizing early on that security measures against computer viruses and malware are essential for information communication networks, we have also engaged in the sale and support of information security-related products. In recent years, cyber attacks targeting specific entities have become a social issue, making defensive measures against threats essential for businesses and organizations. In addition to solutions that defend against malicious attacks from outside and prevent information leaks, we provide new solutions that utilize artificial intelligence (AI) to detect anomalies and prevent incidents by leveraging machine learning and mathematical theories against cyber attacks that penetrate internal networks and internal threats that bypass perimeter defenses.