Slide background

CHOOSE AN UTM FIREWALL FROM GERMANY

Slide background

GDPR-COMPLIANT WITH FEW CLICKS

Modular IT security solution
"Made in Germany"

When purchasing our modular firewall solutions, you can select the hardware and software individually and in advance. The goal is for you to use a security solution that exactly meets your individual needs.

In this regard, the focus is always on transparency and on staying on top of things: a central Management Center allows you to pool and handle all security-related tasks. You can switch specific services, such as single support access, on or off and generate passwords for different aspects of the firewall.

With just a few clicks you can be GDPR-compliant when working with our firewall!

Image DGSVO
Image

Individual hardware and software configuration

Image

HARDWARE

 

No matter whether you have a small, medium-sized or large business - we have the right solution for your requirements.

 

HYPERVISOR

Image

NETWORK SECURITY

 

Integrated GDPR agreement

 

Firewall/NAT

 

Internet access

 

NETWORK SECURITY

Protect your network comprehensively for both, internal and external network access and connections. At this point, the inclusion of mobile (IoT) devices as well as cloud services and other internet services are of particular importance.

Image

WEB SECURITY

 

Standard

 

Advanced

 

WEB SECURITY

Should your strategic conditions change, your TUXGUARD Web Security solutions can be easily adapted to the new conditions. Due to the specific structure of our solutions you can face new challenges at any time quickly, effectively and resource-efficiently.

Image

HOTSPOT

 

Content Filter

 

Wired/Wireless

 

Walled Garden

 

HOTSPOT

With our Hot Spot solution you can design a flexible internet access - no matter whether it is wired or wireless. Provide your guests with a secure internet connection: in hotels, restaurants, hospitals, libraries, schools, at fairs or at campsites – at any time.

Image

VPN

 

OpenVPN

 

IPSec

VPN

No matter if it’s remote access for employees, private browsing with terminal devices or networking cloud data centers – an encrypted VPN connection is essential for safely connecting to a private network via the Internet.

Image

MAIL SECURITY

 

Mail proxy

 

Mail server

 

Mail groupware

 

MAIL SECURITY

E-mail is still the most widely used means of communication in companies. This software module ensures adequate protection of the information you send so that it can only be read by the person for whom it is intended.