ARN

Internet of Things growth triggers Allied Telesis security portfolio expansion

“With the rise of the ‘Internet of Things’, the consequences of inadequate security are significant.”

Networking security provider, Allied Telesis, has announced the launch of its Next-Generation Firewalls (NGFWs), a new range of security appliances for protecting enterprise and government organisations, remote offices, and embedded applications.

Cyber threats are continually evolving and becoming more sophisticated. Targeted and tailored attacks are increasingly defeating traditional defences, and so require a solution with greater intelligence and insight.

“And it’s not just businesses that are at risk,” explains Graham Walker, Product Manager, Allied Telesis.

“An increasing number of embedded applications, such as those used for building management, surveillance and control, are being connected to the Internet.

“With the rise of the Internet of Things, the consequences of inadequate security are significant.”

Walker says the new Allied Telesis NGFWs deliver a security platform with integrated application control, intrusion prevention, and actionable reporting.

Increased protection is available by subscribing to leading security services that provide web filtering, anti-malware, and protection against advanced persistent threats.

“The new range of firewalls allows an enterprise to deploy next-generation security measures at the branch office, rather than relying on the firewall at the headquarters to protect everyone,” Walker adds.

“These new products allow up-to-the-minute protection company-wide, and at a fraction of the cost of traditional firewall solutions.”

According to Walker, market feedback shows that three things are important to NGFW users: security, manageability, and performance.

“Utilising best-of-breed security packages from industry-leading vendors means the new NGFWs can offer the best protection available,” he adds.

“And with auto-updates, security never expires. Features such as application control allow security to be defined in terms of business rules rather than networking protocols, so policy enforcement is easier, and fewer mistakes are made.”