Increasingly, applications have become more advanced and users expect to be able to work from anywhere, at any time. Traditional packet filtering and stateful packet inspection firewalls alone do not provide the level of control necessary to both enable and protect your business. Next generation firewalls are an emerging technology incorporating intrusion prevention and detection features into the firewall. These sophisticated devices protect your organization from advanced threats by performing deep packet inspection and making more granular access decisions based on the full packet payload.
Our Next Generation Firewall Management service eases the adoption of this technology by extending your IT staff with certified and accredited next generation firewall specialists. These trained experts will ensure optimal configuration, tuning, and provide 24x7 management and monitoring services.
The Managed Next Generation Firewall service includes on-demand reporting via the Dell SecureWorks Customer Portal. Through advanced reporting functionality, the Dell SecureWorks Customer Portal provides full service visibility alongside meaningful security insights and perspectives. For more on the Dell SecureWorks Customer Portal, click here.
The Dell SecureWorks Customer Portal features integrated business intelligence and analytics tools to help you gain the meaningful insights and new perspectives you need to answer these questions and make better security decisions. Highly customizable data visualizations and reports give you point-in-time snapshots as well as historical trending perspectives across multiple security metrics.
The management summary view provides an illustration of all the activity on your managed next generation firewall devices.
The Managed Next Generation Firewall map report provides a geographical representation of top sources and destinations.
Dell SecureWorks' Next Generation Firewall service protects sensitive information and corporate networks by providing policy-based visibility and control over applications, users and threats. This enables enterprises to detect more sophisticated threats and provides more granular control over the information entering and exiting the network.