You can achieve "internal measures" that are possible because of the security switch.
The security switch TiFRONT can implement three internal measures: "threat prevention," "spread prevention," and "network visualization." It detects and prevents suspicious activities, such as a malware-infected PC being used as a stepping stone for unauthorized access to other PCs or file servers connected to the network, or being scanned by the network. Additionally, it identifies terminals infected with malware that have become zombie PCs, raises alerts for suspicious activities, and prevents the spread of infection by isolating them from the network. 【Features】 - Can be implemented without changing the layout - Detects, blocks, and releases attacks on the access network - Immediate blocking upon detection through integration with entrance and exit measures - Visualization of the internal network - Streamlining of operational management For more details, please contact us or download the catalog.
Inquire About This Product
basic information
**Features** - Equipped with a linkage function that immediately identifies the device and reliably blocks it upon detecting a threat (when using FortiGate for internet entry and exit measures). - Visualization of the internal network: Displays logs of threat attacks such as DoS attacks and ARP spoofing, as well as device threats, in the form of statistical information like graphs. - Integrated authentication function: Achieves endpoint security by combining individual authentication methods such as IEEE802.1X RADIUS authentication, web authentication, and MAC address authentication. - Stacking function: Centrally manages up to 8 TiFRONT devices as if they were a single unit. - Loop prevention function: In the event of a LAN loop failure, automatically shuts down the affected ports quickly, not only between TiFRONT ports but also through island hubs. - LAN cable redundancy function: Automatically switches to a standby cable in the event of a LAN cable break, ensuring high reliability and redundancy. For more details, please contact us or download the catalog.
Price information
Please contact us.
Delivery Time
※Please contact us.
Applications/Examples of results
For more details, please contact us or download the catalog.
catalog(1)
Download All CatalogsCompany information
The company was established in 1994 as a provider of IT-related product imports, sales, and technical support. We primarily offer distribution and technical support for cutting-edge computer network-related products and information communication security products from the United States. Recognizing early on that security measures against computer viruses and malware are essential for information communication networks, we have also engaged in the sales and support of information security-related products. In recent years, cyber attacks targeting specific entities have become a social issue, making defense measures against threats essential for businesses and organizations. In addition to solutions for defending against malicious external attacks and preventing information leaks, we provide new solutions that utilize artificial intelligence (AI) to detect early signs of cyber attacks that penetrate internal networks and internal threats by leveraging machine learning and mathematical theories, thereby preventing incidents before they occur.