Submit Search
Upload
Aensis idps 1000 v ext_eng
•
0 likes
•
133 views
J
Jose Luis Garcia Rodriguez
Follow
Appliance IDPS 1000 of the Aensis Spanish Company
Read less
Read more
Technology
Report
Share
Report
Share
1 of 2
Recommended
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
Endpoint Security Evasion
Endpoint Security Evasion
Invincea, Inc.
Endpoint Protection
Endpoint Protection
Sophos
презентация1
презентация1
sagidullaa01
XG Firewall
XG Firewall
DeServ - Tecnologia e Servços
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
Security Measures
Security Measures
hanna91
CYRENWebSecurity
CYRENWebSecurity
Jennifer Hinton
Recommended
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
Endpoint Security Evasion
Endpoint Security Evasion
Invincea, Inc.
Endpoint Protection
Endpoint Protection
Sophos
презентация1
презентация1
sagidullaa01
XG Firewall
XG Firewall
DeServ - Tecnologia e Servços
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
Security Measures
Security Measures
hanna91
CYRENWebSecurity
CYRENWebSecurity
Jennifer Hinton
3.2.2 security measures
3.2.2 security measures
hazirma
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
Aventis Systems, Inc.
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Network Performance Channel GmbH
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
Network Security
Network Security
Abdul Qadir Pattal
What is network security and Types
What is network security and Types
Vikram Khanna
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Sophos
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Digital Bond
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilities
omriyad
An introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
Cyber security-briefing-presentation
Cyber security-briefing-presentation
sathiyamaha
Network security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
FireEye Engineering
FireEye Engineering
Lauren Traurig
Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
まちの記事を書いてみましょう
まちの記事を書いてみましょう
義治 蛭本
Planificación de Biología con las web 2.0
Planificación de Biología con las web 2.0
Aracely Calderon
More Related Content
What's hot
3.2.2 security measures
3.2.2 security measures
hazirma
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
Aventis Systems, Inc.
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Network Performance Channel GmbH
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
Network Security
Network Security
Abdul Qadir Pattal
What is network security and Types
What is network security and Types
Vikram Khanna
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Sophos
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Digital Bond
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Savvius, Inc
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilities
omriyad
An introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
Cyber security-briefing-presentation
Cyber security-briefing-presentation
sathiyamaha
Network security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
FireEye Engineering
FireEye Engineering
Lauren Traurig
Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
What's hot
(20)
3.2.2 security measures
3.2.2 security measures
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Network Security
Network Security
What is network security and Types
What is network security and Types
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilities
An introduction to Cyber Essentials
An introduction to Cyber Essentials
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Cyber security-briefing-presentation
Cyber security-briefing-presentation
Network security - Defense in Depth
Network security - Defense in Depth
FireEye Engineering
FireEye Engineering
Intrusion prevention system(ips)
Intrusion prevention system(ips)
Viewers also liked
まちの記事を書いてみましょう
まちの記事を書いてみましょう
義治 蛭本
Planificación de Biología con las web 2.0
Planificación de Biología con las web 2.0
Aracely Calderon
Spelling words l15
Spelling words l15
Yeiny Peña Camacho
Revicion3
Revicion3
griesman
MY CERTIFICATE
MY CERTIFICATE
Adam Abdul Hanan
Deber encuesta
Deber encuesta
Aracely Calderon
ライブラリアンによるWikipedia town、wikipedia artsへの支援 code4lib2015
ライブラリアンによるWikipedia town、wikipedia artsへの支援 code4lib2015
Kumiko Korezumi
Presentación de empresa
Presentación de empresa
genesis ferrer
Mahmoud+Abd+ElHady-CV-2016
Mahmoud+Abd+ElHady-CV-2016
Mahmoud Abd El Hady
Viewers also liked
(9)
まちの記事を書いてみましょう
まちの記事を書いてみましょう
Planificación de Biología con las web 2.0
Planificación de Biología con las web 2.0
Spelling words l15
Spelling words l15
Revicion3
Revicion3
MY CERTIFICATE
MY CERTIFICATE
Deber encuesta
Deber encuesta
ライブラリアンによるWikipedia town、wikipedia artsへの支援 code4lib2015
ライブラリアンによるWikipedia town、wikipedia artsへの支援 code4lib2015
Presentación de empresa
Presentación de empresa
Mahmoud+Abd+ElHady-CV-2016
Mahmoud+Abd+ElHady-CV-2016
Similar to Aensis idps 1000 v ext_eng
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
José Carlos Álvarez
Light sec for service providers brochure
Light sec for service providers brochure
George Wainblat
Panda Security - Endpoint Protection
Panda Security - Endpoint Protection
Panda Security
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
Metaorange
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
Dhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
Eximbank security presentation
Eximbank security presentation
laonap166
Iot(security)
Iot(security)
Shreya Pohekar
Level 3 Security solutions
Level 3 Security solutions
Alan Rudd
Cisco Security Presentation
Cisco Security Presentation
Simplex
Genesys-2-Brochure-Web
Genesys-2-Brochure-Web
Giovanni Maree
Proactive Security That Works
Proactive Security That Works
Brett L. Scott
Intercept product
Intercept product
David Pereira
Sreerag cs network security
Sreerag cs network security
Sreerag Gopinath
Information Security
Information Security
Mohit8780
Product brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
Cyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP
Cloud Computing
Cloud Computing
Commit Software Sh.p.k.
Similar to Aensis idps 1000 v ext_eng
(20)
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
Light sec for service providers brochure
Light sec for service providers brochure
Panda Security - Endpoint Protection
Panda Security - Endpoint Protection
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Dhishant -Latest Resume
Dhishant -Latest Resume
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Eximbank security presentation
Eximbank security presentation
Iot(security)
Iot(security)
Level 3 Security solutions
Level 3 Security solutions
Cisco Security Presentation
Cisco Security Presentation
Genesys-2-Brochure-Web
Genesys-2-Brochure-Web
Proactive Security That Works
Proactive Security That Works
Intercept product
Intercept product
Sreerag cs network security
Sreerag cs network security
Information Security
Information Security
Product brochure-print-spread
Product brochure-print-spread
Cyber Security: A Hands on review
Cyber Security: A Hands on review
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Cloud Computing
Cloud Computing
More from Jose Luis Garcia Rodriguez
Aensis brochure 2017 Spanish
Aensis brochure 2017 Spanish
Jose Luis Garcia Rodriguez
Tecnología zerosecond
Tecnología zerosecond
Jose Luis Garcia Rodriguez
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
Jose Luis Garcia Rodriguez
Aensis idps 1000 v ext
Aensis idps 1000 v ext
Jose Luis Garcia Rodriguez
Presentación aensis
Presentación aensis
Jose Luis Garcia Rodriguez
Aensis ciberseguridad ultima generacion
Aensis ciberseguridad ultima generacion
Jose Luis Garcia Rodriguez
More from Jose Luis Garcia Rodriguez
(6)
Aensis brochure 2017 Spanish
Aensis brochure 2017 Spanish
Tecnología zerosecond
Tecnología zerosecond
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
Aensis idps 1000 v ext
Aensis idps 1000 v ext
Presentación aensis
Presentación aensis
Aensis ciberseguridad ultima generacion
Aensis ciberseguridad ultima generacion
Recently uploaded
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Hyundai Motor Group
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Recently uploaded
(20)
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Aensis idps 1000 v ext_eng
1.
Pag. 1 de
2 AENSIS© IDPS-1000 Aensis© CyberDefense Systems ( IDPS) provide the most complete and accurate protection from and coverage of Command & Control (C2) Communications from current and future malware. Unlike other solutions, Aensis© IDPS systems are Full Spectrum protection devices which are updated daily from our cloud servers in order to maximize the coverage against malware provided in companies and organizations. Campaigns of current malware attacks often tend to act for a number of hours, which makes the typical weekly or longer interval updates useless. IT Infrastructure environments are under constant attack regardless of the size of the organization or company. With the exponential increase in the number of malware threats reaching epidemic proportions, as well as increasing complexity, businesses and organizations are barely able to maintain proper security in their networks. Aensis© CyberDefense Devices safeguard your organization or company from threats such as: • Botnets • Malware • Spyware • Click Fraud • Machines that perform brute force attacks • Worms and Trojans • Scareware • Back Doors • DOSNET • Spambot • Computers "Zombie" • Threats to SCADA Systems In addition, they are extremely effective performing functions such as: • Detection and Threat Protection Activex • Recognition of Application Activity (Chat, P2P..) • Detect compromised devices (Infected/Rooted Networking devices, etc..) • Recognition of DoS and DDoS Attacks • Detection and protection against attacks, exploits and vulnerabilities in FTP • Detection of game traffic (WoW, StarCraf, etc ..) • Detection and protection against attacks, exploits and vulnerabilities in IMAP • Detection of activity of terrorist groups • Detection and Protection from inappropriate material and Pornography • Malware detection and protection of mobile devices (smartphones, tablets) • Detection and protection against attacks, exploits and vulnerabilities in Netbios • Detection of P2P traffic and attacks • Detection of Security Policy violations • Detection and protection against attacks, exploits and vulnerabilities in POP3 • Detection and protection against attacks, exploits and vulnerabilities in RPC • Detection and protection against attacks, exploits and vulnerabilities in SCADA/ICS • Port Scan Detection • Detection and Protection against Shellcode Attacks • Detection and protection against attacks, exploits and vulnerabilities in SNMP • Detection and protection against attacks, exploits and vulnerabilities in SMTP • Detection and protection against attacks, exploits and vulnerabilities in SQL Databases • Detection of TELNET activity • Detection and Registration of TFTP activity • Detection of TLS events and anomalies Fingerprinting and Whitelisting of TLS Certificates • Identification of TOR traffic nodes • Identification of User Agents • CVE Coverage • Detection and protection against attacks, exploits and vulnerabilities in VoIP • Detection and protection against attacks,ºº exploits and vulnerabilities in Web Clients and Apps • Detection and protection against attacks, exploits and vulnerabilities in Web Servers • Identification and blocking traffic activity indicative of worms or trojans • "on the fly" Patching of vulnerable Microsoft Windows Servers The ability to detect and prevent security breaches in corporate networks is becoming more valuable to businesses permanently connected to the Internet. However, these tools must evolve to adapt to the reality of the start of art threats and attacks, through which the attackers aimed not only at systems but individuals. Many IDPS systems manufacturers have failed to evolve their products beyond the typical vulnerabilities and "exploits" and therefore these solutions are unable to cope with modern attacks and their subsequent Command and Control Communications. It is imperative that companies and organizations keep abreast of modern trends of threats and risks of exfiltration, data loss and devastating consequences for your organization or business. Installing Aensis© CyberDefense systems at your company, these assets become an effective weapon in the fight against modern cyber criminals and the sophisticated tools they employ.
2.
Pag. 2 de
2 AENSIS© IDPS-1000 Security Features: - Deep Packet Inspection (Full Packet) Unlike the competition, our devices scan the full length of packets at wire speeds. -Completely Transparent IPS Mode Aensis© CyberDefense devices are installed as “bump in the network”, it does not require complex routing configurations or intrusive authentication mechanisms that consume significant bandwidth. Advanced data transfer modes enable highest performance and full compatibility with your present ecosystem of networking devices. -Single-Pass Deep Packet Inspection Threat Protection: DoS, DDoS attacks, malformed / fragmented packets, Advanced Persistent Threats (APTs), mobile malware, botnets, Ransomware, Shellcode, etc ... VoIP: Protection of H.323, SIP, call and session security, protection and detection of vulnerabilities in VoIP equipment. Web Filter: Fully managed, flexible and configurable to customer requirements. Available Security subscriptions: --IPS, AntiMalware, APTs and IP Reputation Defense in a single license. - Web Filter - Data Loss Prevention - Anti-Spam Satellite Time-synchronization: - Several critical vulnerabilities have been found in the time setting software NTP. The Network Time Protocol is not secure anyway due to the lack of a secure authentication mechanism. Internet NTP servers are open to compromise by cyberterrorists in a way it can pose serious problems for your networked devices reliant on Internet Time Synchronization. By employing private, isolated Built-In Satellite Time Syncronization, Aensis© CyberDefense devices become the first on their class in offering a comprehensive solution for an ever growing problem. Management: -Secured User Web Access, intuitive Aensis© SIEM console. -User Command Line (via SSH), with 2 distinct Administrative Levels Working temperature range: -10C ~ +60C Power Consumption: 220 W Networking: Completely transparent IPS mode, supports all mainstream networking and routing protocols and does not interfere with legitimate traffic. Certifications: -IPSec VPN, CC EAL4+, FIPS 140-2 -RoHS (Hardware) Features Aensis© IDPS-1000: Supported Full-Spectrum IPS Wire Speed: +600Mbps/IPS port pair Throughput: 4 Gbps Interfaces:RJ45 6x 10/100/1000Mbps, 2xWAN, FC:2xSFP+ 10Gbps, 1xWAN FC Concurrent Connections (bi-directional): 36,360,000 New connections/ second: 800,000+ VLANS: 800+ Authenticated Users: Not Limit VPN Tunnels: 800+ Protective Capabilities: Full Spectrum, 22,500+ Applications PLUS: Threat GeoLocation, Satellite Time-Sync, SSL Acceleration HIGH AVAILABILITY UNLIMITED WARRANTY DURING SERVICE: Our devices are proudly made with Industrial Robustness and Reliability. Even in the case one of our devices fails, our unlimited warranty has you covered.