Ensure all your connections are secure at network level
Enhanced Security with SD-WAN Pro
With SD-WAN Pro, businesses can create a single high bandwidth connection with increased reliability and improved productivity.
Real time Monitoring On CPEs and Service nodes
All CPEs and service nodes are registered to our real time monitoring system and raise alerts when a device is unreachable or unresponsive as well as if any security related event is raised such as a system file modification, root password change etc. Moreover all system resources are monitored to identify high resource utilization on CPU, RAM, HDD and all available system resources. Access to the monitoring system is granted to the end client who can also integrate it to their monitoring system using the available API.
Traffic Authentication at Node Level
The CPE and the aggregation server authenticate each other using 4096-bit RSA keys and the TLS v1.2 protocol along with a strong encryption cipher suite (256-bit AES encryption with SHA-384 message authentication and ephemeral ECDH key exchange signed with an RSA certificate). Keys are generated, managed and signed by a private PKI, avoiding the problems of trusting third party CAs, presenting a far smaller attack surface by eliminating the complex certificate chain validation risks commonly lInked with SSL security. All the above ensure no attacker can modify or forge bonded traffic between the CPE and aggregation server.
IP VPN encryption as standard
The system has the ability to perform SSL IP VPN encryption for hub-and-spoke VPNs using 4096-bit RSA keys with SHA256 certificates, TLS v1.2, and Diffie-Hellman key exchange with elliptic curves.
Secure remote CPE access
Industry-standard SSL protects the appliance from unauthorized control. The CLI that could be accessed with SSH is equipped with protective functions by using access control lists. All services integrated in the router can be precisely configured in regards to how these services are accessible via which interfaces and IP networks.
Packet-Level Distribution Across Bonded Connections
By its nature, the technology is highly secure. The packet-level distribution algorithm spreads traffic across multiple Internet connections. Even if an attacker manages to capture one of your individual Internet connections, only a small part of your entire traffic is visible. So, even though this is not a standardized security feature, it clearly provides a strong additional level of security.