Skip to content

Internet 2.0’s patented Cloaking Firewall is designed to defeat 99% of cyber attacks. It comes in two versions being single firewall and as a Secure Internet Gateway

It is available on AWS, VCloud and via Hardware on Premise.

Purpose

The Cloaking Firewall is an innovative technology that removes the ability of cyber attackers to find your network and hack it. The technology allows your network to disappear from internet wide scanning, which is an essential process that malicious actors use to identify new targets.

Disappear from internet-wide scanning services such as Shodan, Censys.io, and BinaryEdge that malicious actors regularly use to find new targets with Internet 2.0 Cloaking Firewall.

Single Firewall

Single Firewall is available on AWS and is designed to embed directly in from of your server.

Cloaking Internet Gateway - CIG

Internet 2.0 Cloaking Firewall also comes as a Secure Web Gateway. The aim is to run all services through the gateway as an exit node to the internet. If you run multiple nodes you have resiliency and flexibility while having centralized management of your perimeter. At the CIG you can centralize your policy on rules, signatures, telemetry and gain the advantage of Cloaking Firewall. It is the new form of edge routing in the cloud.

It comes as a single software package that requires VMWare to run. This means you can install it anywhere on premise or in the cloud.

Each Gateway node is capable of 2Gbps throughput.

Download Detailed Whitepaper and product Sheets

Subscribe to download

Comments

Latest