Network Security

Managed IT Services | Gainesville, FL

Network Security

Phalanx Network Security Suite

Phalanx Network Security Suite is a next-generation cyber security solution that denies access to known malicious programs and uses a “Default Deny” approach to automatically contain unknown programs until they can be evaluated.

Phalanx is made up two components.

Doru is a Firewall

“Doru” is a DNS Firewall that, like the 12’ Hoplite spear it is named for, works to keep the enemies at a distance where they cannot harm your network. By scanning all inbound and outbound traffic, Doru is able to identify and block threats like spoofed websites, fake virus warnings and ransomware packages.

Firewall Features

Base URL Filtering by category database
Malware Site Protection
Phishing and Fraud Sites Protection
Block Anonymous Proxies
Roaming Endpoint Agent
Domain Blacklisting and Whitelisting
Location Based Configuration
No Hardware to Install

Aspis is Endpoint Protection

“Aspis” is the large round shield that the Hoplites interlocked to form the Phalanx. As a part of our Phalanx Network Security Suite, it provides the endpoint protection as another layer of defense for your network. Most anti-virus solutions use a “default allow” approach. This means that when a program tries to run, the standard solution checks it against a black list of known malicious programs.

Aspis utilizes a “Default Deny” approach. Programs trying to run are compared to a blacklist as usual. But then they are compared to a white list of known safe programs. If the program is on the white list, it runs as normal. If not, it is placed in containment where it runs until a determination is made about whether or not it is a threat. If it is not, all is well and the program is released into the “real world.” If not, the containment is flushed and any damage the program might have done is averted.

Endpoint Protection Features

Default Deny Approach – unique approach adopted by Aspis which prevents all files by default from entering the system until they prove themselves to be harmless.

Containment – technology which backs default deny approach by ‘containing’ or ‘restraining’ files and running them in a separate environment, until they prove themselves to be harmless, without affecting your PC(s) security.

Host Intrusion Prevention System (HIPS) – ability to comprehensively monitor your PC(s) and prevent malicious attacks from entering it. It makes use of a ‘set of behavior analyzers’ to carry out the search.

VirusScope – another technology unique to this virus protection software, which is useful for local PC analysis. It also helps PC users to undo malicious-looking changes which PC(s) might have recorded as a result of malicious actors.

A Double Layer of Defense

This double layered defense approach will keep your network safe from the vast majority of threats and will even work on mobile devices that are not physically located at your place of business.

The defense of your network must keep pace with the newest threats. This is a problem for the standard “Default Allow” approach as the latest threats are not stopped until they have already been identified and added to anti-virus definitions. With Phalanx, we can protect all of your assets from workstations to servers to cell phones to tablets secure with our “Default Deny” and “Containerization” solution.

Combine this with a router-based or firewall appliance Intrusion Detection and Prevention system and a robust backup plan and your data is as safe as it can be.

 The Greek Hoplites stood shoulder to shoulder with overlapping shields and 12’ spears, ready to defend those that were behind them. At Gnosys Network, we have adopted the name of these warriors in our Network Security Solution. “Doru” DNS Firewall and “Aspis” Endpoint Protection coupled with Pythia Endpoint Monitoring with 24x7x365 monitoring provides a top of the line, layered defense against the threats to your data.