Is your business network secure and productive?
The iShield Business is a next-generation firewall that does deep-packet inspection including application level inspection and intrusion prevention/detection by utilising intelligence from outside of the firewall. The firewall is also referred to as a smart access Unified Threat Management (UTM) device that is located at your office, giving you the ability to remotely control your entire network via the Cloud.
Book a DemoBecome a PartnerIntroducing the iShield for Business
iShield is a smart access Unified Threat Management device located at your premises, allowing you to remotely control your entire network from one centralized location.
Protect
your network
Monitor
your staff’s performance
Block
unproductive sites
Report
from anywhere, anytime
Tiered approach for businesses
We have a variety of hardware options available to help you manage your customers networks. Each iteration of the iShield is equipped with the same functionality, the only differentiator being the number of users and the internet speed that each unit will support before network degradation becomes prevalent.
iShield
SMB
- 4x Gigabit Network Interfaces
- Celeron Processor
- 8GB RAM
- 200mbps Throughput
- 200 Users
iShield
SMB Rack
- 6x Gigabit Network Interfaces
- i3 Processor
- 8GB RAM
- 200mbps Throughput
- 200 Users
iShield
Pro
- 6x Gigabit Network Interfaces
- i5 Processor
- 16GB RAM
- 1000mbps Throughput
- 1000 Users
iShield
Business
- 6x Gigabit Network Interfaces
- i7 Processor
- 32GB RAM
- 1000mbps Throughput
- 1000+ Users
Simplified cybersecurity
- Device identification
- VLAN segmentation
- Firewall security
- GeoBlocking
- Safer browsing, Safer search
Uninterrupted operations
- Multi-link failover
- Branch VPN connectivity
- Remote user VPNs
Enhanced productivity
- Staff usage reports and security alerts
- Traffic shaping
- Policy-based URL filtering
- Audit logs
- Voice prioritization
Simplified cybersecurity
- Device identification
- VLAN segmentation
- Firewall security
- GeoBlocking
- Safer browsing, Safer search
Uninterrupted operations
- Multi-link failover
- Branch VPN connectivity
- Remote user VPNs
Enhanced productivity
- Staff usage reports and security alerts
- Traffic shaping
- Policy-based URL filtering
- Audit logs
- Voice prioritization