Recently, Fidelis Security Systems launched the Fidelis XPS BladeArray as part of its Fidelis XPS telecom platform deployment offering, a solution that is available in a NEBS-compliant chassis.
Thanks to the company’s patented deep session inspection technology, the Fidelis XPS BladeArray supports full analysis and breach prevention up to 20 gigabits per second. The scalable, blade-based architecture of the offering is used to provide real-time analysis of traffic coming in and leaving networks to enable customers to maintain their security posture as requirements grow.
Additionally, because the telecom platform deployment solution is NEBS-compliant, it can meet stringent reliability and quality requirements of service requirements. The solution also features an internal switch that provides a session-aware load-balancing function to distribute traffic between Fidelis XPS blades.
Organizations today face an array of challenges when dealing with a large volume of network traffic. It is especially difficult for devices in the advanced network security stack to keep up. Enterprises that have concentrated Internet access to a small number of high-capacity locations and make use of modern IT infrastructure such as cloud-based services are facing these challenges the most.
“For many years, enterprises who weren't security-minded have either not thought of using next generation security products capable of advance threat protection or used workarounds like traditional firewalls and other basic security devices," said Hardik Modi, senior product manager, Fidelis Security Systems, in a statement.
"These band-aid approaches won't work as enterprises need more bandwidth while having to counter advanced threats,” Modi added. “New security solutions like Fidelis XPS BladeArray are vital in scaling to meet this capacity and catch every potential threat coming in or sensitive data leaving the network."
Fidelis’ portfolio includes advanced threat management, intelligent forensics, data breach prevention and cloud services security on high capacity networks at key points of control such as Internet access points and internal aggregation points.
Edited by Jamie Epstein