i-ComplyG3

Data loss resulting from cyber-attacks is one of the greatest threats facing businesses today.  It's why having a network perimeter security solution in place is critical to any information security program.

I-Evolve's i-ComplyG3 is an innovative network firewall system that forms the foundation necessary to protect your business data, network and critical assets from external intruders and threats. 

Unfortunately, many businesses continue to be challenged by the management of in-house security solutions due to the heavy technical burdens and lack of skilled internal security personnel.  I-Evolve's i-ComplyG3 is a proven managed firewall solution that is uniquely designed to address all the complexities associated with the deployment, management and ongoing threat monitoring of enterprise firewalls.

i-Comply Managed Firewall

Product Features

License Models

Standard

Enterprise

Stateful Firewall - tracks the operating state and characteristics of network traffic.

Multi-WAN Failover and Policy Based Routing – configure multiple Internet connection to share the traffic load, or add a redundant  Internet connection to the i-ComplyG3 to achieve a higher  reliability network connection

Scalable – i-ComplyG3 is right sized for your usage and needs.
i-ComplyG3 can accommodate growth as needed.

Configuration Backups - backups of configuration changes are safely stored offsite in I-Evolve’s secure cloud.

Monitoring – alerting and escalation alerting are included

Replacement Hardware – I-Evolve maintains stock replacement hardware in the event of an onsite hardware failure

Site to Site VPN – IPSEC and SSL capabilities

Remote Access VPN – IPSEC, SSL, Two factor authentication

Next-gen Intrusion Prevention System - Provides advanced protection from all types of modern attacks. It goes beyond traditional server and network resources to protect users and apps on the network as well.

 

Advanced Threat Protection - Instant identification and immediate response to today’s most sophisticated attacks. Multi-layered protection identifies threats instantly provides an emergency response.

 

Advanced VPN technologies - Adds unique and simple VPN technologies including our clientless HTML5 self-service portal that makes remote access incredibly simple.

 

Powerful user and group web policy - Provides enterprise-level Secure Web Gateway policy controls to easily manage sophisticated user and group web controls.

 

Advanced Web Threat Protection - i-ComplyG3's advanced engine provides the ultimate protection from today’s polymorphic and obfuscated web threats. Innovative techniques like JavaScript emulation, behavioral analysis, and origin reputation help keep your network safe.

 

Layer-8 Application Control and QoS - Enables user-aware visibility and control over thousands of applications with granular policy and traffic-shaping (QoS) options based on application category, risk, and other characteristics.

 

Executive Summary Reports – Internet and web content usage statistics based on user or machine

 

 

i-Secure WiFi: i-ComplyG3 Wi-Fi Add On

i-Secure Wi-Fi is a security system that extends the capabilities of your firewall to the wireless access points all without the complexity of additional management consoles, vendors or licenses.  i-Secure Wi-Fi and I-Evolve’s i-Comply G3 managed firewall service works from the endpoint to the edge to secure the connected mobile world.

i-Secure Wi-Fi Feature Highlights

  • Wireless management via i-ComplyG3 managed router/firewall which includes automatic firmware and security patching to the Wi-Fi access points.
  • Active Directory integration for wireless authentication.
  • Extend firewall protection to the access point level to protect your network from wirelessly generated malicious data traffic.
  • Proactive access point monitoring
  • Rogue access point detection

i-ComplyG3 Benefits

  • No expensive hardware costs or
    capital investment.
  • Industry leading threat protection
    and intrusion prevention.
  • Simplified security management.
  • Improved disaster recovery
  • 24x7 monitoring.
  • Increased productivity.
  • Scalable to meet your organization’s
    needs.

Download the data sheet

Request a Quote

Cloud Solutions

Overview

Cloud VoIP

Managed Firewall

Cloud Antivirus

Data Backup & Recovery

Email and Spam Protection

Cloud Servers

Cloud Desktops

Network Monitoring

Web Services