PROXEDO
Network Security

Flexible defense of enterprise networks

 PROXEDO Network Security

Proxedo Network Security (PNS) is a highly flexible, multipurpose network security software which can granularly control traffic to protect enterprises from advanced internal and external threats. PNS provides deep packet inspection (DPI) of regular and encrypted network communication and has the capability to filter and modify its content. Thanks to its flexible architecture and scriptable configuration, your organization can implement ANY security policy, including the Zero Trust model.

 PROXEDO Network Security

Key Features

We are a leading developer of proxy-based gateway technologies

Key Features

We are a leading developer of proxy-based gateway technologies

Traffic manipulation

Traffic manipulation

  • Data masking for compliance or privacy
  • Hiding security vulnerabilities of legacy systems
  • Easy solution for custom compatibility issues
Comprehensive encryption

Comprehensive encryption

  • Control of SSL / TLS-encrypted protocols
  • TLS 1.3 cryptography support
  • IPSec and OpenVPN support
Granular protocol control

Granular protocol control

  • Full interpretation and validation of 15+ network protocols
  • Control of protocol channels (e.g. file transfer, port forward)
  • Connection handling on the application layer

Use cases

Separation and Protection of Critical Systems

PNS can help you create a mature and segregated IT environment, allowing you to better focus your security strategy on prioritized systems. Additionally, it can provide a way to isolate compromised hosts or networks in a timely manner following a network intrusion.

 Separation and Protection of Critical Systems
 Separation and Protection of Critical Systems

Benefits

UNPARALLELED CONFIGURATION POSSIBILITIES

Proxedo Network Security offers almost unlimited flexibility for you to adjust connection parameters. This means you can avoid bad trade-offs between effective business processes and the desired level of security. You can implement virtually any security policy. By using Python-scripts, even complex, multivariable decisions can be made.

MOST COMPREHENSIVE TRAFFIC CONTROLS

In contrast with the pattern matching of UTMs, PNS handles network connections on the proxy level. This means that the transferred information is available on the device in its entirety, enabling deep protocol inspection and validation. The gateway can understand the specifications of the protocols and can reject connections that violate the standards.

HIGHLY SKILLED AND FLEXIBLE ENGINEERS

Balasys has a flexible professional services team which helps you design, deploy, customize and support your PNS solution on-site. Our highly skilled engineers can solve network security problems that other vendors can't solve (or only with costly custom development). We help you tailor your PNS: we can reconfigure your network, write scripts, integrate with third-party tools or even develop custom modules. Thanks to our senior support engineers, we can also provide you with highly professional, 24/7 vendor support.

BEST VALUE FOR MONEY

Proxedo Network Security is a highly customizable, reliable and resource-efficient suite available at an affordable price. Combined with flexible integration services, engineer-to-engineer access, trainings and direct vendor support, the product represents one of the best value offerings on the network security market today.

CLEAN CODEBASE

Proxedo Network Security is made in the EU and developed by a private Hungarian IT security company, Balasys.

Features

GRANULAR PROTOCOL CONTROL

GRANULAR PROTOCOL CONTROL

  • Full interpretation and validation of 15+ network protocols
  • Control of protocol channels (e.g. file transfer, port forward)
  • Connection handling on the application layer
COMPREHENSIVE ENCRYPTION

COMPREHENSIVE ENCRYPTION

  • Control of SSL / TLS-encrypted protocols
  • TLS 1.3 cryptography support
  • SSL and IPSec VPN
TRAFFIC MANIPULATION

TRAFFIC MANIPULATION

  • Data masking for compliance or privacy
  • Hiding security vulnerabilities of legacy systems
  • Easy solution for custom compatibility issues
SINGLE SIGN-ON

SINGLE SIGN-ON

  • Malware filtering with multiple engines (with optional spam and URL-filtering)
  • ICAP support for integration with AV-, IDS/IPS- and DLP-tools
  • Certificate validation at the perimeter
ROBUST CENTRAL MANAGEMENT

ROBUST CENTRAL MANAGEMENT

  • Enterprise-level, multi-site firewall management
  • License- and certificate-management
  • Advanced management GUI
UNPARALLELED CONTENT FILTERING

UNPARALLELED CONTENT FILTERING

  • Strong authentication (S/Key, SecurID, X.509, etc.)
  • LDAP/AD, Kerberos- and Radius-support
  • PKI support
DETAILED AUDIT LOGGING

DETAILED AUDIT LOGGING

  • Logging of encrypted network traffic
  • High log verbosity for better network debugging and forensics
  • Seamless integration with log analyzing and SIEM tools
SUPPORTED PROTOCOLS AND STANDARDS

SUPPORTED PROTOCOLS AND STANDARDS

  • HTTP, SSH, RDP, IMAP, POP3, SMTP, TELNET, VNC, (T/S)FTP
  • NNTP, SSL/TLS, Oracle SQL/Net8, LDAP, RADIUS, VoIP SIP
  • MS RPC, MIME, RSH, LPR, SOAP, SOCKS