Firewall Applications

  • Home
  • Firewall Applications

Flexibility. Get What You Want, When You Want It.

Raptor Firewalls is exceptionally easy to use with a simple app based graphical UI allowing us to tailor a RF Firewall for your network needs. To gain the highest level of protection and flexibility, purchase an RF Firewall Complete subscription.

Raptor Firewalls gives you more protection at the gateway in a single solution—saving you time and money. Tackle malware, hacking attempts, phishing schemes and other exploits before they ever reach your users.

Virus Blocker app leverages signatures from Bitdefender™. Bitdefender is a trademark of Bitdefender and used under license.

Protect

Raptor Firewalls gives you more protection at the gateway in a single solution—saving you time and money. Tackle malware, hacking attempts, phishing schemes and other exploits before they ever reach your users.

Firewall

Drawing the line that separates internal and external networks, Firewall filters traffic based on IP address, protocol and port, which enables our administrators to designate which systems and services (HTTP, FTP, etc.) are publicly available. Raptor Firewalls can be run as a transparent bridge to complement a pre-existing firewall and allows you to control inbound and/or outbound access to specific IPs and ports.

Intrusion Prevention

Intrusion Prevention blocks hacking attempts before they reach internal servers and desktops. Pre-configured signature-based IPS makes it easier for our administrators to provide 24/7 network protection from hackers. It minimizes annoying false positives and ensures that signatures are always current with automatic updates. With an easy-to-use setup wizard allowing simple configuration of rules specific to each environment, Intrusion Prevention provides flexible control.

Phish Blocker

Identity thieves are becoming increasingly sophisticated with email and website spoofs that are nearly impossible to discern from the real thing. Phish Blocker protects users from email phishing attacks and fraudulent pharming websites. Protection for SMTP protocols ensure that signatures are always current with automatic updates.

Threat Prevention

Threat Prevention adds an additional layer of insight and security for Raptor Firewalls users. Threat Prevention scans IP addresses, blocking or granting access to web and application-based content after a complete analysis of the IP address reputation. IP address reputation scoring is based on the Webroot BrightCloud® IP Reputation Service ranking system. This intelligent, real-time packet inspection categorizes IP addresses into five distinct categories – High Risk, Suspicious, Moderate Risk, Low Risk, and Trustworthy.

Virus Blocker

Virus Blocker leverages signatures from Bitdefender™, the leader in speed and efficacy, whose threat lab experts work 24-hours a day, 365-days a year to identify emerging threats. Heuristic models provide an additional layer of protection against zero-day threats, and real-time updates with no system downtime ensure that your network is always protected. Virus Blocker identifies and blocks zero-day threats, viruses, worms, Trojan horses, botnets, unknown malware, and new infections.

Ad Blocker

Eliminate annoying advertisements and decrease page load times with Ad Blocker. Based on the open-source project AdBlock Plus, Ad Blocker lets you easily block ads at the gateway without installing browser plugins. Prevent malware and scam links through banner ads while reducing traffic on the network.

Filter

Get a handle on every rogue application, encrypted web request, malware distribution point, drive-by malvertising attempt, and rash of spam. NG Firewall puts you in control of what your users can access, install and use.

Application Control

Do you have a handle on your network traffic? If you’re only choosing to block or allow websites by URL, that may not be enough. Today, you need the ability to control traffic at the application level. Enter Application Control. Application Control helps you wrangle productivity drains, bandwidth hogs and protocol-agile apps used for filter bypass. It works in concert with Web Filter & SSL Inspector.

Spam Blocker - SMTP

Raptor Firewalls sits between the Internet and your mail server and filters and quarantines fraudulent email—spam, phishing and email fraud—preventing it from reaching your users. Its smart analysis delivers a catch rate of 99.5% while minimizing false positives. Spammers constantly adjust their content and tactics to evade spam blockers. Spam Blocker is updated in real-time to keep you one step ahead of spammers. Quarantine is automatic and maintenance-free.

SSL Inspector

More and more Internet traffic is being encrypted using HTTPS, which creates a huge blind spot for firewalls. It compromises their ability to analyze traffic, identify threats or handle policy violations. SSL Inspector solves this problem. Whether it is driven by concerns about personal privacy, or the rise of web applications like Salesforce, Netflix and Facebook, the amount of encrypted Internet traffic has exploded. SSL Inspector puts Raptor Firewalls in the middle of the encrypted traffic, with the ability to decrypt and analyze the data as it passes through.

Web Filter

Web Filters helps our administrators ensure web and content security across the network. Easily and quickly create policies to block porn, gambling, videos, social networks, shopping sites or other undesirable or inappropriate content and applications from being accessed. Allow, block, flag or alert by category to easily set up rules that meet your criteria. With Web Filter, you can easily monitor or control searches across popular search engines including Google, YouTube, Ask, Bing, and Yahoo.

Web Monitor

Web Monitor enables our administrators to categorize web site requests, giving them complete visibility to web traffic. Web Monitor categorizes the largest URL database of its kind across 79 categories, including high-risk categories, with 750+ million domains and 32+ billion URLs classified across 45+ languages. Additionally, Web Monitor evaluates millions of dangerous IPs correlated with URLs. As sites are visited, they are dynamically categorized using cloud-based lookups for real-time categorization. Additionally, Web Monitor categorizes HTTPS traffic using SNI and/or any certificate information.

Bandwidth Control

Competing traffic impacts your Quality of Service (QoS). Bandwidth Control helps you manage the priority of business-critical, recreational and inappropriate traffic before it impacts the Internet experience of your users. Recreational apps and websites (video, streaming media, gaming, file sharing) can suck up available bandwidth, bringing your network performance to a crawl. Bandwidth Control puts you in charge of your bandwidth allocation. It starts with tracking and monitoring bandwidth usage, enabling you to pinpoint the problem applications, websites or users.

Perform

Balance competing priorities, ensure quality of service (QoS) and maximize uptime while saving the organization money–with features you can’t get from competitive NGFW and UTM products.

WAN Balancer

If you have two or more Internet connections, WAN Balancer helps you maximize your cumulative network performance and throughput by distributing the traffic based on simple rules. For example, if you have a 100 Mb/s cable connection and a 12 Mb/s DSL, WAN Balancer enables you to send 10% of your traffic over DSL and 90% over cable. WAN Balancer enables you to distribute traffic across multiple Internet connections into a cost-effective alternative to pricey high-bandwidth connections.

WAN Failover

No ISP is foolproof, they all have planned and unplanned downtime. That’s why we recommend using multiple ISPs and WAN Failover. WAN Failover tests your Internet connections, and when one slows or fails, it can reroute network traffic over the remaining connections, maximizing your uptime. WAN Failover also logs all downtime for each connection, arming you with the evidence you need to hold your ISPs accountable.

Web Cache

Internet users download the same web elements (images, page headers, embedded content, text, etc.) over and over again; Web Cache speeds browsing performance by caching these static elements and serving them locally. Web browsers all use local web caches to accelerate browsing performance. Web Cache applies this same principle across your network, enabling cached elements to be shared by all Internet users on your network. Reduced bandwidth is nice, but faster page loading—resulting in happier users—is the real reason you should use Web Cache.

Connect

Tackle the challenges of a remote workforce, branch offices and guest Wi-Fi. Keep users and data safe regardless of location or level of access.

Captive Portal

Captive Portal allows our administrators to block Internet access for users until they complete a defined process. With Captive Portal you can require users to view or accept an Acceptable Use Policy before accessing the Internet (e.g. public WiFi). You can also configure Captive Portal to be displayed only at certain times. Enable custom integrations from acknowledging Acceptable Use Policies (AUP) to accepting payments for Wi-Fi hotspot access.

IPsec VPN

If you want to securely extend your network to remote users or knit together branch offices into a single virtual network, IPsec VPN is the tool you need. Working remotely—from home, a remote branch, or even a café—is increasingly popular, but it creates serious risks for network administrators and users. If they access the Internet directly, they are exposed to Wi-Fi hackers, viruses, and more. IPsec VPN solves all of that by routing them through Raptor Firewalls, where all of the same policies and protections are provided via a secure encrypted tunnel directly between your network and the user.

OpenVPN

OpenVPN enables our administrators to provide secure remote access to the internal network to remote users and sites. NG Firewall’s intuitive GUI makes it easier to configure basic settings through a setup wizard. You can generate custom certs for each client, and easily distribute pre-configured client software via email. Our next-gen OpenVPN allows you to quickly and easily connect private networks, devices, and servers to build a secure, virtualized modern network. The way it should be.

Tunnel VPN

Tunnel VPN is powered by a fully featured ruleset, enabling WAN optimizations around which traffic is sent through the tunnel and directed at any given interface, host, subnet, port or other criteria. Like other Raptor Firewall apps, Tunnel VPN uses a tagging feature to enable advanced, dynamic routing scenarios based on specified criteria. Tunnel VPN features a configuration wizard to enable connections to many privacy VPN providers like another ExpressVPN, NordVPN or even another Raptor Firewall. There are also generic options which support most commonly available OpenVPN-based providers.

WireGuard VPN

Working remotely is common practice and considered essential for most organizations to support, but it can create serious risks and headaches for network administrators and users. If users access the Internet directly through an unknown or open network like public Wi-Fi, they may be exposing your network, systems, and databases to Wi-Fi hackers, viruses, and more. WireGuard VPN solves that by routing them through the Firewall, where all of the same in-office network policies and protections are provided via a fast yet secure encrypted tunnel directly between your network and the user.

Reports

Raptor Firewalls reports are database-driven, allowing you to drill down into any aspect of the traffic on your network. The reports are fully dynamic, interactive, and customizable. Slice and dice based on hosts, users, policies, domain, or literally any column on any table. Additionally, the Reports app enables you to create alert rules. Alert rules are evaluated on all events logged in the database and will log and/or email our administrators when a given condition is met. This enables administrators to stay on top of threats, policy breaches, system status and more.

close chatgpt icon
ChatGPT

Enter your request.