Scroll Down To Learn More.
All-in-One Cyber Security Solution
Having more smart devices connected makes life more comfortable, but leaves you vulnerable. Your laptops, smartphones, televisions – even the smart locks on your doors can be infected and manipulated to rob you of your personal information and privacy on your own network. Even the best antivirus software doesn’t protect your smart devices. And your PC? It only takes one virus to steal everything you have. To protect your devices from these modern threats, you need to stop them from ever coming through the front door.
Until now, if you wanted to control what each person can access on the internet, you’d need to setup a local web filter. To protect your network from DDOS attacks or hackers, you’d need to buy an intrusion prevention system. To protect your information while using a public WiFi hotspot, you’d need to purchase a secure VPN subscription. Our product combines all of these elements and more into a single device – giving you a complete cybersecurity solution.
Unified Threat Management
Unified Threat Management (UTM) devices are the newest category of security appliances being used today. A UTM device combines firewalling, intrusion detection and prevention, content filtering, VPNs, deep packet inspection, and more onto a single platform.
Intrusion Prevention Systems monitor network traffic for malicious activity. The IPS’s main goal with this is to identify threats such as suspicious activity and known attack methods. If the system notices anything out of the ordinary, it logs the activity, reports it, and blocks it.
Deep Packet Inspection is a level of network packet filtering used at the enterprise & government levels. This is possible by examining each data packet, including headers, as it passes through an inspection point; searching for viruses, spam, intrusions, non-compliance, and defined criteria to allow the packet to be passed, rerouted, or blocked entirely.
DNS Filtering is a way to block users from specific web sites on the internet. It can also be used to block malicious websites. IP Filtering is similar in that it blocks access to specific IP addresses. GeoIP Filtering is an advanced IP filtering solution that blocks connection based on their relative GPS location and country-specific region.
- DNS Filter
- Filter by categories
- Filter by blacklist & whitelist
- Policies per user or network
- Machine learning system for automatic categorization of unknown URLs
- Access logs and reporting
- IP Filter
- Filter malicious threats
- Filter known phishing sites
- Filter IP addresses with poor reputation
- GeoIP Filter
- Filter inbound traffic by country or region
- Filter outbound traffic by country or region
Virtual Private Networks (VPN) extend a private network across a public network like the Internet. Devices connected to the VPN transmit their traffic through a secure tunnel, protected with both authentication and encryption protocols. Because of the nature of the tunnel, all the security elements of the UTM device extend to clients using the VPN service. The system is available for use by Windows, Mac OSX, Android, iOS, and even Linux devices.
In addition to firewalling, networking and routing tasks include the distribution of private addresses using DHCP for both IPv4 and IPv6 addresses, Network Address Translation (NAT) and more. With a rule-based system, traffic is correctly directed between devices on each of the networks.
To maintain the highest level of security, all UTM security systems are updated automatically throughout the day, 365 days of the year. many of the updates occur on an hourly basis to ensure the most up-to-date security protocols and definitions. Some systems, like the machine-learning system in the DNS Filter, update in real-time 24/7.
Next Generation Wireless Technology
We’re all thinking it. Wi-Fi can be a pain. The low-end router provided by your ISP can barely handle streaming two shows at the same time. Moreover, if you’re on the other side of the office. It’s like it doesn’t exist at all. Welcome to the dead zone – where the only solution is buying more of the same equipment. Soon you will tend to spend your Saturday afternoon strategically placing devices around your office to get rid of the holes in your network that your first one cannot fix. Doesn’t that seem a little off?
Blue Box is all-in-one device, doesn’t end at security
We think that quality is better than quantity. Rather than calculating “hop distances” with multiple units, we wanted to give you something better. A single device with a working wireless range farther than three of the leading brand. With dual band, 4×4 MIMO technology bringing you up to 1200 Mbps; you can say goodbye to buffering.
Firewall Hardware Specifications
||Intel J1900, 2M Cache @ 2.42GHz
||2GB SO-DIMM 1600MHz
||16GB High Speed SSD
||4x Intel Gigabit Ethernet Controller
Wireless Hardware Specifications
|Chipset||Atheros QCA9563 + QCA9882 +QCA8035
|IEEE 802.11a/b/g/n/ac 4x4 MIMO 1200Mbps
2.5GHz & 5GHz simultaneous
|Wireless Security||64/128-bit WEP, WPA/WPA2