Next Generation

Internet Security

Scroll Down To Learn More.

All-in-One Cyber Security Solution

Having more smart devices connected makes life more comfortable, but leaves you vulnerable. Your laptops, smartphones, televisions – even the smart locks on your doors can be infected and manipulated to rob you of your personal information and privacy on your own network. Even the best antivirus software doesn’t protect your smart devices. And your PC? It only takes one virus to steal everything you have. To protect your devices from these modern threats, you need to stop them from ever coming through the front door.

Until now, if you wanted to control what each person can access on the internet, you’d need to setup a local web filter. To protect your network from DDOS attacks or hackers, you’d need to buy an intrusion prevention system. To protect your information while using a public WiFi hotspot, you’d need to purchase a secure VPN subscription. Our product combines all of these elements and more into a single device – giving you a complete cybersecurity solution.

Next Generation

Unified Threat Management

Unified Threat Management (UTM) devices are the newest category of security appliances being used today. A UTM device combines firewalling, intrusion detection and prevention, content filtering, VPNs, deep packet inspection, and more onto a single platform.

Intrusion Prevention Systems monitor network traffic for malicious activity. The IPS’s main goal with this is to identify threats such as suspicious activity and known attack methods. If the system notices anything out of the ordinary, it logs the activity, reports it, and blocks it.

Deep Packet Inspection is a level of network packet filtering used at the enterprise & government levels. This is possible by examining each data packet, including headers, as it passes through an inspection point; searching for viruses, spam, intrusions, non-compliance, and defined criteria to allow the packet to be passed, rerouted, or blocked entirely.

DNS Filtering is a way to block users from specific web sites on the internet. It can also be used to block malicious websites. IP Filtering is similar in that it blocks access to specific IP addresses. GeoIP Filtering is an advanced IP filtering solution that blocks connection based on their relative GPS location and country-specific region.

  • Real-time traffic analysis
  • Packet logging
  • Protocol Analysis
  • Content Searching/Matching
  • Attack prevention
    • DDOS
    • Port Scans
    • SMB Probes
    • OS Fingerprinting
  • Application recognition
  • IP payload signature verification
  • Sensitive data policy management (SSN, Credit Card #’s, etc)
  • Detect spyware, malware, trojans, viruses
  • Attack detection
  • DNS Filter
    • Filter by categories
    • Filter by blacklist & whitelist
    • Policies per user or network
    • Machine learning system for automatic categorization of unknown URLs
    • Access logs and reporting
  • IP Filter
    • Filter malicious threats
    • Filter known phishing sites
    • Filter IP addresses with poor reputation
  • GeoIP Filter
    • Filter inbound traffic by country or region
    • Filter outbound traffic by country or region

Virtual Private Networks (VPN) extend a private network across a public network like the Internet. Devices connected to the VPN transmit their traffic through a secure tunnel, protected with both authentication and encryption protocols. Because of the nature of the tunnel, all the security elements of the UTM device extend to clients using the VPN service. The system is available for use by Windows, Mac OSX, Android, iOS, and even Linux devices.

In addition to firewalling, networking and routing tasks include the distribution of private addresses using DHCP for both IPv4 and IPv6 addresses, Network Address Translation (NAT) and more. With a rule-based system, traffic is correctly directed between devices on each of the networks.

To maintain the highest level of security, all UTM security systems are updated automatically throughout the day, 365 days of the year. many of the updates occur on an hourly basis to ensure the most up-to-date security protocols and definitions. Some systems, like the machine-learning system in the DNS Filter, update in real-time 24/7.

  • Secure key exchange
    • SSL/TLS protocols
  • Certificate-based authentication
  • User-based authentication
  • UTM security features available through VPN
    • IDS/IPS
    • Content Filtering
    • Secure traffic
  • DHCP
    • Server for IPv4
    • Server for IPv6
  • Rule Based Protection
  • NAT and DNAT
  • Automatic updates for
    • Core operating system
    • IDS/IPS
    • IP filter
    • GeoIP filter
    • DNS filter
    • Blacklist/whitelist
    • Known malware, spyware

Next Generation Wireless Technology

We’re all thinking it. Wi-Fi can be a pain. The low-end router provided by your ISP can barely handle streaming two shows at the same time. Moreover, if you’re on the other side of the office. It’s like it doesn’t exist at all. Welcome to the dead zone – where the only solution is buying more of the same equipment. Soon you will tend to spend your Saturday afternoon strategically placing devices around your office to get rid of the holes in your network that your first one cannot fix. Doesn’t that seem a little off?

Blue Box is all-in-one device, doesn’t end at security

We think that quality is better than quantity. Rather than calculating “hop distances” with multiple units, we wanted to give you something better. A single device with a working wireless range farther than three of the leading brand. With dual band, 4×4 MIMO technology bringing you up to 1200 Mbps; you can say goodbye to buffering.


Firewall Hardware Specifications


Intel J1900, 2M Cache @ 2.42GHz



16GB High Speed SSD


4x Intel Gigabit Ethernet Controller

Power Supply



Fanless System

Wireless Hardware Specifications

Chipset Atheros QCA9563 + QCA9882 +QCA8035

Memory 128MB DDR2

Storage 16MB Flash

Wireless Protocol
Frequency Band
IEEE 802.11a/b/g/n/ac 4x4 MIMO 1200Mbps
2.5GHz & 5GHz simultaneous
Wireless Security 64/128-bit WEP, WPA/WPA2
WPA-PSK encryption
Range 165 feet