Maximum Cloud Security and Performance
Work more efficiently, reduce costs, react quickly to meet new requirements – you want to use the advantages of the cloud but still have concerns about security? With our virtual Cloud Security Gateway, you can use this technology with confidence.
The gateway is positioned at the highly sensitive cloud-Internet interface and monitors all data traffic. Most importantly, the content of the data stream is analyzed at the application level. You achieve a uniquely high level of IT security for your data and applications in the cloud.
The thorough data contents inspection sets the virtual Cloud Security Gateway apart from other solutions such as packet filters and so-called next generation firewalls, which only inspect a number of formal criteria or samples from the contents. The Cloud Security Gateway’s technological affinity with the genugate firewall guarantees that our customers are using top security technology: The high security level provided by the genugate is regularly certified by the German Federal Office for Information Security (BSI) according to the Common Criteria standard at the EAL 4+ level. The uniquely high resistance against direct attacks is consistently noted during these certifications.
The virtual Cloud Security Gateway is based on the application level gateway technology of the High Resistance Firewall genugate. This firewall system inspects the contents of the data stream: the incoming packets are reassembled into records and the content analyzed by the inspection software. The Cloud Security Gateway is equipped with numerous high quality inspection softwares to thoroughly monitor the various protocols and applications. The gateway also decodes and analyzes data encrypted with TLS. Unwanted content and dangerous malicious software can thereby be reliably detected and blocked.
As a virtual system, the Gateway, in combination with your cloud platform, ensures optimum performance at all times with low administrative effort:
the Cloud Security Gateway achieves a data throughput of up to 700 Mbit/s per core. If the data throughput at the interface increases, the cloud management system automatically starts additional gateway instances that are deactivated later once the throughput drops. You can operate as many instances as required to meet your performance requirements. The additional instances are configured directly via the cloud platform. For easy, individual administration, the Gateway also offers a REST interface.
Do you want to know what’s happening at the sensitive cloud-Internet interface? The Cloud Security Gateway provides you with this information: logs are created for all processes that occur at the interface. These files can be readily evaluated as well as used for analyses with additional tools.
Adaptation to Other Cloud Environments Possible
The virtual gateway is designed for securing OpenStack-based clouds. On request, we can adapt this solution to other cloud environments. We would be happy to discuss your needs!
As a collaborative learning company, it is our mission to continuously improve and share our knowledge of IT Security with you. In our Knowledge Base we offer you articles, white papers, analyst reports, research results, videos and more in the field of IT security.