Firewall Services

  • Home
  • Firewall Services

Network Security Simplified

Managing your network and ensuring every device is adequately protected can be a complex and costly task. Dolphin Computers NG Firewall simplifies network security with a single, modular, software platform designed to fit the evolving needs of your organization.

Designed specifically for organizations with limited IT resources and budgets, Dolphin Computers NG Firewall provides a browser-based, responsive and intuitive interface enabling you to quickly gain visibility into the traffic on the network. From content filtering to advanced threat protection, VPN connectivity to application-based shaping for bandwidth optimization, Dolphin Computers NG Firewall delivers a comprehensive, enterprise-grade network security platform for organizations in any industry.

Security, Visibility & Control

Comprehensive Security at the Gateway

Proactively stop malware, hacking attempts, phishing schemes and other threats before they reach users’ devices.

Deep Analysis and Insights

Gain insights in real time from database-driven reports without the need for a separate appliance. See the network status at a glance on the dashboard, ensure compliance with full event logs, and get notifications of network anomalies or unusual user behavior with alert rules.

Network Orchestration

Raptor Firewalls Reports gives you visibility into all of your NG Firewall and the ability to access them remotely from a single login and central management view. Support provisioning makes it easy for us to deploy your appliance without physical access. We can configure and push policy templates, create global alerts, view real-time information on hosts, and initiate an endpoint security scan.

Next-Generation Filtering

Get a handle on every rogue application, encrypted web request, malware distribution point, drive-by malvertising attempt, and rash of spam.

Superior Connectivity & Performance

Meet the challenges of a remote workforce, branch offices and guest Wi-Fi. Keep users and data safe regardless of location or level of access. Balance competing priorities, ensure Quality of Service (QoS) and maximize uptime while saving your organization money.

Cyber Threat Intelligence

ScoutIQ™ cyber threat intelligence aggregates anonymous telemetry information across files, URLs, and IPs observed across NG Firewall deployments and performs detailed threat analyses across all traffic types seen on today’s networks, providing a second layer of defense and superior protection against unknown and emerging threats.

How it works

Managing the security of distributed networks and connected devices can be a daunting task for IT administrators and MSPs. Dolphin Computers Command Center gives clients the ability to view network traffic across locations simply and easily from a cloud-based console, accessible from any browser.

By default, the Dashboard will display several widgets showing different information. However, the Dashboard is completely customizable. Widgets can be removed and added so the we see exactly the information that is important to keeping your business safe.

Dolphin Computers NG Firewall’s reports are database-driven, allowing us to drill down into any aspect of the traffic on your network. The reports are fully dynamic, interactive, and customizable. Slice and dice based on hosts, users, policies, domain, or literally any column on any table. Additionally, the Reports app enables us to create alert rules.

Software subscriptions for NG Firewall allow us to easily and affordably build and manage a secure network for your business or medical office. Using Command Center, we can centrally manage all your Untangle network appliances, and even deploy hardware appliances, from anywhere.

Dolphin Computers NG Firewall is an award-winning unified threat management solution trusted by hundreds of clients around central Florida. From content filtering to advanced threat protection, VPN connectivity to application-based shaping for bandwidth optimization, NG Firewall delivers comprehensive,
enterprise-grade network security and connectivity.

Image

Protect

Proactively block malware, phishing, spam, hacking and other exploits from reaching users and devices on the network.

Protect

Raptor Firewalls gives you more protection at the gateway in a single solution—saving you time and money.
Get A Quote

Perform

Ensure network performance and bandwidth for your organization’s business-critical cloud apps. Maximize uptime to increase productivity.

Perform

Balance competing priorities, ensure quality of service (QoS) and maximize uptime while saving the organization money.
Get A Quote

Filter

Get a handle on every rogue application, encrypted web request, malware distribution point and rash of spam.

Filtering

Get a handle on every rogue application, encrypted web request, malware distribution point and rash of spam.
Get A Quote

Connect

Maintain visibility and control over remote workers, branch offices and guest Wi-Fi. Keep users and data safe, no matter their location.

Connect

Tackle the challenges of a remote workforce, branch offices and guest Wi-Fi. Keep users and data safe regardless of location.
Get A Quote

Ensuring Security, Enforcing Policies

The IT landscape has changed from businesses issuing managed devices to a mix of both business-provided and personally owned devices (bring your own device or “BYOD”). The shift to BYOD has been driven by the ubiquity of consumer electronics and businesses accommodating employee requests to use their personal devices for work. The bottom line for businesses has also improved from BYOD increasing employee productivity and reducing overhead costs to track and manage company-owned devices.

The Need for WiFi Security

In addition to BYOD deployments increasing, the way devices connect to the network is also in a state of transition from ethernet to Wi-Fi. With wireless connectivity a standard capability in laptops, cell phones, tablets and other devices, effectively deploying BYOD requires businesses to provide open Wi-Fi access for these personal devices.

For network administrators to support both BYOD and open Wi-Fi, they need a solution that can handle all devices—whether business-managed or personal—that connect to both the wired and wireless network.

Don't Become a Victim

No Obligation. No Contracts. Cancel Anytime.