Platinum T40 Maintenance Plan. Under this Plan, the firewall is maintained under warranty, integrated in with our ticketing system along with regular firmware updates to protect and maintain the following:
• APT Blocker: Uses an award-winning, next-generation sandbox to detect and stop even the most sophisticated threats, including ransomware, zero-day threats, and others that are designed to slip past traditional security systems.
• Threat Detection and Response: Security data is used with enterprise-grade threat intelligence to detect and immediately respond to malware attacks.
• DNSWatch: Detects and blocks suspicious DNS requests, redirecting users to a safe page with information on security best practices
• Data Loss Prevention: Prevent sensitive information from leaving your network via email, web, or file transfer protocol.
• Access Portal: Get access to all cloud-hosted applications in one central location.
• Wireless Intrusion Prevention: Using patented Marker Packet technology, this program reliably detects and classifies all access points and connected devices in your airspace.
• Intrusion Prevention: Uses continually updated signatures to scan traffic and providing real-time prevention against threats.
• URL Filtering: Blocks known malicious sites, as well as inappropriate content. Also helps conserve network bandwidth.
• Gateway Antivirus: Using the same continuously updated signatures employed in the Intrusion Prevention feature, Gateway Antivirus finds and blocks spyware, viruses, trojans, worms, and rogueware, including new versions of old viruses. It also works to track suspicious data constructions to catch new viruses before they slip by.
• Network Discovery: Generates a visual map of every device connected to your network and identifying risks, including open ports and protocols.
• Reputation-Based Threat Protection: Aggregates data from multiple feeds to protect you from malicious sites and botnets, while also dramatically improving overhead processing.
• Spam Prevention: Protection from spam and phishing attacks. This program is so aggressive that it can review up to 4 billion emails per day.
• Application Control: Decide who, what, when, where, and why devices and users are allowed to access applications on your network.

