TIANGOU secure gateway (TSG)

Guarantee Your Edge Network Security-To See and Secure Everything

Overview

      TSG is a full-featured, one-stop solution for network perimeter security. TSG performs deep packet inspection on network traffics, classifies their content using a stream-based analysis engine, and provides a simple, integrated security service. TSG could be deployed at high-bandwidth, complex environments, such as large data centers and ISP backbone networks, and adapt to different network environments with a flexible architecture.  

Main Features

next-generation firewall​

  • Access Control: Object-based policy abstraction delivers fine-grained and convenient perimeter security
  • SSL/TLS Decryption: Inspect encrypted traffic to confirm no malicious content or malware passes through
  • Application Firewall: Identify 1000+ Apps and behaviors

network visibility​​

  • Big data network analytics: Extracts 180+ log fields from high-bandwidth networks, index and search them in seconds
  • Advanced Reporting: Provides SQL-like customization capabilities, as well as pre-built reports and templates
  • Live Charts: Display protocol composition in real-time

Highlights

flexible deployment

  • Ability to deploy at Fixed, Mobile, and/or Satellite Networks, asymmetric flows are handled properly
  • In-line or passively deployment options according to customer needs
  • Support multiple data centers and clusters deployment

Fine-grained control

Provide accurate and comprehensive control by user account, geography, ASN and etc

Application firewall

Deny or allow more than 1000 applications based on their behaviors and attributes

Decryption

Decrypt and inspect encrypted traffic between server and client and prevent the threat

App Signature Customization

Define your own App by combining standard protocol fields in TCP/IP, HTTP, SSL, etc., and also support uploading Lua script for custom features

Traffic Visibility

  • Encrypted traffic visualization: Transparent proxy enables you to perform advanced traffic manipulation to inspect and handle the threat
  • Network performance monitor: View network traffic composition and transmission performance in real-time
  • User-defined report: Specify data preprocessing logic, analysis rules, and display form to create your own report and extract high-value information from the vast amount of logs

Designed for large organization

  • Role-based permission control
  • Audit log
  • 2-Factor Authentication
  • LDAP integration