By Casey Ulaky Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices

Source:: Cisco Security Notice

By Casey Ulaky Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices

Source:: Cisco Security Notice

By Taslimm Quraishi For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the

Source:: Cisco Security Notice

By Taslimm Quraishi For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the

Source:: Cisco Security Notice

By Ben Greenbaum Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage. They sift through threat

Source:: Cisco Security Notice

By Ben Greenbaum Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage. They sift through threat

Source:: Cisco Security Notice

By Talos Group Cisco Talos has been tracking a new version of Smoke Loader — a malicious application that can be used to load other malware — for the past several months following

Source:: Cisco Security Notice

By Talos Group Cisco Talos has been tracking a new version of Smoke Loader — a malicious application that can be used to load other malware — for the past several months following

Source:: Cisco Security Notice

Einfache Anbindung von Aussenstellen

Kennen Sie das?
Sie möchten Ihre Außenstellen in Ihr Netzwerk integrieren,

aber Sie haben…

  • …dort wenig bis gar kein IT-Personal
  • …eine hohe Komplexität durch verschiedenste Hersteller und Management-Systemenn
  • …strikte Sicherheitsanforderungen
  • …ein geringes IT-Budget

Oberberg-Online bietet eine einfache und sichere Lösung.

FortiGate
Next Generation Firewall & VPN-Gateway. Hardware-beschleunigt.
Integriertes Management für FortiSwitch, FortiAP und FortiExtender.

FortiSwitch mit PoE
Sicherer LAN-Zugang. Zentrale Administration über die FortiGate Firewall.

FortiAP
Sicherer WLAN-Zugang.
Zentrale Administration über die FortiGate Firewall. Funktionen wie Gäste-Portal inklusive.

Das ist enthalten:

  • Umfangreiche Sicherheit durch FortiGate Next Generation Firewall, inkl. Antivirus, Intrusion Prevention, Web-Filter, Application Control und Anti-Spam Services uvm.
  • In die FortiGate integrierter Controller für FortiSwitch und FortiAP
  • Internet Cloud Service Datenbank, z.B. für lokales Breakout für Office 365
  • 1 Jahr Security- und Firmware- Updates und 8×5 Support
  • Einfaches Disaster Recovery, z.B.über USB-Port
  • Redundante WAN-Anbindung
  • IoT Device Detection
  • uvm.

Das sind Ihre Vorteile:

  • Modular & skalierbar – individuell nach Ihren Wünschen zusammenstellbar
  • Einfaches, zentrales Management der Switche und Access Points über die Firewall
  • Hohe Visibilität
  • Maximale Sicherheit
  • Höchste Durchsatzleistung durch Hardware-Beschleunigung (Security Prozessoren)
  • Keine versteckten Folgekosten für User-basierte Lizenzen

Auf Wunsch erweiterbar um:

  • 24×7 Support-Services des Herstellers
  • HA-Modus mit zweiter FortiGate
  • Management durch Oberberg-Online
  • Schutz vor neuartigen Bedrohungen mit FortiSandbox Cloud Service
  • Backup Internet-Anbindung über LTE 3G/4G mit FortiExtender
  • redundantes Anbindungskonzept durch Oberberg-Online
  • weitere Komponenten der Fortinet Security Fabric

Gerne stehen wir Ihnen hier zur Seite:

Dirk Zurawski
02261 9155051
zurawski@oberberg.net
DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

By Jason Maynard Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS,

Source:: Cisco Security Notice