Security

iShield for Business



Is Your Business Network Secure And Productive?

The iShield Business is a next-generation firewall that does deep-packet inspection including application level inspection and intrusion prevention/detection by utilising intelligence from outside of the firewall. The firewall is also referred to as a smart access Unified Threat Management (UTM) device that is located at your office, giving you the ability to remotely control your entire network via the Cloud.


Introducing the iShield NG5 for Business


iShield is a smart access Unified Threat Management device located at your premises, allowing you to remotely control your entire network from one centralized location.


PROTECT your network.

MONITOR your staff’s performance.

BLOCK unproductive sites.

REPORT from anywhere, anytime.


Tiered Approach for Businesses


We have a variety of hardware options available to help you manage your customers networks. Each iteration of the iShield is equipped with the same functionality, the only differentiator being the number of users and the internet speed that each unit will support before network degradation becomes prevalent.


iShield Models


iShield SMB
  • 4 Gigabit Network Interfaces
  • Intel Celeron Processor
  • 4GB RAM
  • 200mbps Throughput
  • 200 Users

iShield SMB Rack
  • 6 Gigabit Network Interfaces
  • Intel i3 Processor
  • 8GB RAM
  • 200mbps Throughput
  • 200 Users

iShield Pro Rack
  • 6 Gigabit Network Interfaces
  • Intel i5 Processor
  • 8GB RAM
  • 1000mbps Throughput
  • 1000 Users

iShield Pro Rack Plus
  • 8 Gigabit Network Interfaces
  • Intel i5 Processor
  • 32GB RAM
  • 1000mbps Throughput
  • 1000 Users

iShield i7 Business
  • 6 Gigabit Network Interfaces
  • Intel i7 Processor
  • 32GB RAM
  • 1000mbps Throughput
  • 1000 Users

iShield Key Benefits For Businesses


Remote Access

To your office using a custom free DynDNS name no static IP or third parties required.


URL Blocking

Restrict access to websites. Time-based blocking. Pre-made blacklists.


Traffic Shaping

Limit speed for unproductive websites and prioritize work sites. Prioritize VoIP calls and improve VoIP stability and quality.


Network Identities

Create network identities in order to control guest networks.


VLANS

Set up Virtual LAN networks from the iShield to simplify network management.


Google Safe Browsing

Protection from zero-day attacks and phishing sites.