TIANGOU secure gateway (TSG)
Guarantee Your Edge Network Security-To See and Secure Everything
Overview
TSG is a full-featured, one-stop solution for network perimeter security. TSG performs deep packet inspection on network traffics, classifies their content using a stream-based analysis engine, and provides a simple, integrated security service. TSG could be deployed at high-bandwidth, complex environments, such as large data centers and ISP backbone networks, and adapt to different network environments with a flexible architecture.
Main Features
next-generation firewall
- Access Control: Object-based policy abstraction delivers fine-grained and convenient perimeter security
- SSL/TLS Decryption: Inspect encrypted traffic to confirm no malicious content or malware passes through
- Application Firewall: Identify 1000+ Apps and behaviors
network visibility
- Big data network analytics: Extracts 180+ log fields from high-bandwidth networks, index and search them in seconds
- Advanced Reporting: Provides SQL-like customization capabilities, as well as pre-built reports and templates
- Live Charts: Display protocol composition in real-time
Highlights
flexible deployment
- Ability to deploy at Fixed, Mobile, and/or Satellite Networks, asymmetric flows are handled properly
- In-line or passively deployment options according to customer needs
- Support multiple data centers and clusters deployment
Fine-grained control
Provide accurate and comprehensive control by user account, geography, ASN and etc
Application firewall
Deny or allow more than 1000 applications based on their behaviors and attributes
Decryption
Decrypt and inspect encrypted traffic between server and client and prevent the threat
App Signature Customization
Define your own App by combining standard protocol fields in TCP/IP, HTTP, SSL, etc., and also support uploading Lua script for custom features
Traffic Visibility
- Encrypted traffic visualization: Transparent proxy enables you to perform advanced traffic manipulation to inspect and handle the threat
- Network performance monitor: View network traffic composition and transmission performance in real-time
- User-defined report: Specify data preprocessing logic, analysis rules, and display form to create your own report and extract high-value information from the vast amount of logs
Designed for large organization
- Role-based permission control
- Audit log
- 2-Factor Authentication
- LDAP integration