Consolidated security platforms provide you with the ability to protect your network with the fastest firewall technology. You also have the freedom to deploy the widest range of security technologies available, to fit your dynamic network environment.

 The concept of security consolidation a decade ago, and continues to lead the industry. We integrate multiple technologies on a single security platform to increase your visibility of applications, data and users, while eliminating redundant and ineffective filtering. The result is improved control over your network coupled with increased performance.

Security platforms include the broadest range of technologies in the industry to give you the flexibility you need to protect your dynamic network. Each includes core security technologies such as firewall, intrusion prevention, application control, web content filtering, and VPN, as well as antispyware, WAN optimization, two factor authentications, anti spam, and much more.

Our high-performance unified threat management solutions provide the visibility you need to detect hidden threats within legitimate content, even from trusted sources and authorized applications. This unmatched protection means you can allow new applications into your network, but automatically block any malicious content or behavior.


Malware infections in networks, servers and endpoint devices cost enterprises, service providers and government agencies billions of dollars every year. You must spend time removing viruses from endpoints and servers, while your organization can lose valuable and sensitive data through spyware and bots that send information undetected from inside the network perimeter to outside command and control servers. In addition, some viruses are capable of taking down your entire network or deleting critical information from servers and databases.

Antivirus technology combines advanced signature and heuristic detection engines to provide multi-layered, real-time protection against both new and evolving virus, spyware, and other types of malware attacks in web, email, and file transfer traffic. It accelerates both signature scanning and heuristics/anomaly detection for protection against viruses, while delivering performance that scales from entry-level appliances to multi-gigabit core network or data center platforms.

In addition to three proxy-based antivirus databases, security platforms include a high-performance flow-based antivirus option. The flow-based option allows you to scan files of any size while maintaining the highest levels of performance. In addition, flow-based inspection enables scanning of files within compressed files to detect hidden threats. By providing you the flexibility to choose your antivirus engine, you can balance your performance and security requirements for your environment.

Antivirus gets regular updates. The threat research team and global distributed network provides industry-leading antivirus signature updates for comprehensive protection against all types of content-level threats. Automatic updates of antivirus signatures keep appliances continuously up to date.

Database Security:

Database servers are the most important servers your company owns. They store all the most critical company assets include client details, financial information, human resource details, product designs and more – all the data that keeps your company in business and, as such, they need to be secure. According to one recent Forrester study, 80 percent of data security breaches involve insiders, employees or those with internal access to an organization, putting information at risk. The big challenge for companies today – particularly as email and the Internet make sharing and distributing corporate information easier than ever – is to strike the right balance between providing workers with appropriate access and protecting sensitive information as much as possible.

Database security and compliance products offer centrally-managed, enterprise-scale, database hardening; fast, comprehensive policy compliance; vulnerability assessment; and database monitoring and auditing for improved data security across the enterprise. Automatic database discovery finds all databases on the network, including those across subnet and WAN boundaries. 24 x 7 database activity monitoring and auditing captures all forms of database activity, from administrative events to user operations, to detect erroneous or malicious activity.

Database auditing records all database activity for complete and accurate audit trails, with independent storage for additional security. Hundreds of pre-installed policies cover standard industry and government requirements and database security best practices, plus a comprehensive set of graphical reports, to deliver out-of-the-box readiness and immediate value. These reports include compliance reporting for important regulations such as PCI-DSS, SOX, GLBA, and HIPAA. Database security and compliance is available both in one of three DB appliances and as software for a wide variety of enterprise operating systems.


Any enterprise with an internet and intranet that allows its workers access to the Internet and corporate resources installs firewalls to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. A firewall, working closely with other networking infrastructure, examines each network packets to determine whether to forward it toward its destination. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources. Threats have evolved much through the years but firewall is still one of the most fundamental protections for network of any sizes.

Firewall technology combines ASIC-accelerated inspection with an arsenal of integrated application security engines to quickly identify and block complex threats. firewall protection integrates with other key security features such as VPN, antivirus, intrusion prevention system (IPS), web filtering, anti spam and traffic shaping to deliver multi-layered security that scales from SOHO/ROBO appliances to multi-gigabit core network or data center platforms. And turn-key appliances provide centralized management of thousands of systems and detailed reporting capabilities for internal auditing and reporting.

Consolidated security appliance fully integrates with other security technologies (e.g., antivirus, Web filtering) enables extensive protection profiles for in-depth defense. Built-in Virtual security domains and security zones enable network segmentation by customer, business unit, or any other physical or logical division for increased policy granularity and multi-layered security.

Firewall supports three operational modes (transparent, static NAT, and dynamic NAT) adapt to existing infrastructure for deployment versatility. With easily customized application definitions, firewall solution delivers additional policy granularity for more accurate protection. In addition, Client end-point security agents integrate with firewall solution to extend firewall protection to remote desktop computers, mobile laptops, and smart phones that operate outside the network perimeter.

Web Application Security:

A web application used to be any application that uses a web browser as a client. Application simple as a message board or a guest sign-in book on a website, or as complex as a word processor or a spreadsheet through a web browser are typically known as web application. Web technology continues to evolve and native applications are more integrated with the Internet than ever before. Web application is no longer restricted by the web browser and it has become standalone application or even operation system that that fully integrates with internet.

Web Application Security solutions provide specialized, layered application threat protection for medium and large enterprises, application service providers, and SaaS providers. Web application firewall protects your web-based applications and internet-facing data. Automated protection and layered security protects web applications from sophisticated attacks such as SQL Injection, Cross Site Scripting attacks and data loss. Web Vulnerability Assessment module adds scanning capabilities to provide a comprehensive solution to meet your PCI DSS section 6.6 requirements.

The solution drastically reduces the time required to protect your regulated internet-facing data and leverages an intelligent, application-aware load-balancing engine to distribute traffic and route content across multiple web servers. This load balancing increases application performance, improves resource utilization and application stability while reducing server response times. Data compression and Independent SSL encryption processor increase transaction throughput and reduce processing requirements from web servers, providing additional acceleration for web application traffic.

Virtual Security:

Virtual appliances and virtual domains enable you to deploy consolidated network security to protect your virtual infrastructure. They increase your visibility and control over communications within your virtualized environments.

Virtual appliances allow you to scale quickly to meet demand and protect intra-virtual machine communications by implementing critical security controls within your virtual infrastructure, running on both VMware and Xen. You have the choice of deploying as virtual or physical appliances.

Virtual and physical appliances also enable you to segment your network into multi-tenant environments. You can create virtual domains and virtual administrative domains to segregate your network into separate domains for subscribers or business units. Appliances and virtual appliances support virtual domains and virtual administrative domains.

Virtual solutions provide you unmatched deployment flexibility. You can choose to deploy a mix of hardware and virtual appliances, operating together and managed from a common centralized management platform. Virtual appliances feature all of the security and networking services found in our physical appliances.

Leon delivers centralized management, visibility, and analysis of your network and current threat profile. Together, they provide the integrated visibility and control you need to secure your physical and virtualized infrastructures. In addition, real-time automatic updates from services keep your organization protected from the latest threats.