"Today’s business and networking environments demand security solutions that are able to analyze high volumes of traffic at gigabit speeds," Ken Gramley, CEO, Emerging Threats
RuleGate® is an Active Network Defense appliance with real-time attack visualization and analytics. RuleGates protect networks from a variety of cyber threats including hacktivists, cyber criminals and hostile nations, as well as campaigns involving malware, spam, phishing, and scanning. Cyber Analysts visualize break-in and data theft attempts on their networks using QuickThreat®, and adapt their protections to respond in real-time. RuleGate-enforced cyber defenses can be fully automated by subscribing to Centripetal Networks’ Threat Intelligence Partner services as well as Centripetal Networks’ Advanced Cyber Threat (ACT) service.
QuickThreat® shows you the attacks that are attempting to penetrate your networks right now. The RuleGate® filters all of the packet traffic traversing your network, checking for millions of Internet attack sources. As each actual attack is detected and blocked, the RuleGate produces a real-time information feed of the attack attempts. The QuickThreat application reads in the real-time feed and then immediately presents the attack data in multiple forms and visualizations, such as a display of the geographic location of the cybercriminals that are targeting your network. By installing QuickThreat on Windows™ and Macintosh™ Computers throughout your organization, you can give your colleagues instantaneous snapshots of the current threat and the strong protections provided by your RuleGate.
RuleGate® Manager enables System Administrators full visibility into the status and health of their RuleGate® systems deployed in enterprise environments. Security Audit Logs maintain accountability and ensure all transactions, including policy changes, are tracked and available for review. High Availability monitoring can track the status of active ports and other High Availability Peers. Hardware System Status, including CPU Load, Memory Usage, Power Supply Status, and critical system Temperatures can all be monitored to maintain the RuleGate system with the highest levels of service. RuleGate Manager can be installed on Windows™ and Macintosh™ Computers throughout your organization, providing immediate insight for System Administrators.
Policy Manager enables organizations to build, maintain, and enforce cyber-security policies to meet the needs of the individual organization. By integrating threat intelligence from Centripetal's industry leading Threat Intelligence Partners, Customer specific intelligence sources, and Centripetal's Advanced Cyber Threat (ACT) subscription service, organizations can design policies with dynamic threat intelligence. Policy Manager can be installed on Windows™ and Macintosh™ Computers throughout your network security organization.