The network is segmented into security zones, allowing custom access rules between them. This enables isolation and management of areas such as internal, external, and guest networks.
Recognizes applications based on signatures or behavior, allowing traffic only to specific applications. Enables application-based access control.
Detects suspicious activity by identifying malicious traffic patterns (IDS) and can automatically block them (IPS). Continuously monitors the network.
Analyzes the connection history of incoming packets, allowing only trusted connections to continue. Enhances connection-based security.
Inspects not only header information but also the content of network traffic. Helps detect protocol violations, malware, and data leaks.
Allows separate security policies for different user groups, device types, or time ranges. Enables flexible and customizable management.
Security rules can be activated during specific days or hours. Tighter policies can be applied outside business hours.
Known botnet communications are automatically blocked. Attackers can be deceived and tracked using honeypot traps.
Limits bandwidth for specific protocols or applications. Protects resources and improves service continuity.
Analyzes web traffic based on domain name (SNI) or content (DPI) to block access to malicious or unwanted websites.
SNI (Server Name Indication): Allows clients to specify the hostname they are connecting to during TLS handshake; enables domain-based filtering.
DPI (Deep Packet Inspection): Inspects both headers and payloads of packets for deeper analysis and filtering, improving security and access control.
Analyzes the X-Forwarded-For header to identify the real client IP. Reveals the user behind the proxy.
Verifies that packets received on each interface come from legitimate sources. Prevents spoofing attacks using fake source IPs in both symmetric and asymmetric routing scenarios.
Suspicious files are sent to external sandbox systems for analysis. Enables detection of zero-day threats.
Only specific MAC addresses are allowed per IP address. Unauthorized devices can be detected and quarantined.
Detects and prevents ARP spoofing attacks within the network. Prevents manipulation of gateway redirection.
Blocks flood attacks involving excessive TCP SYN, ICMP, or UDP packets. Protects systems from being overwhelmed.
Detects attempts to scan for open ports in the network. Such activities can be automatically blocked.
Scans passing files and traffic for malware. Blocks threats such as viruses, trojans, and spyware.
Monitors SSH connections and commands to detect malicious behavior. Prevents unauthorized access.
Limits the number of connections to prevent Denial-of-Service (DoS) attacks. Helps conserve system resources.
Decrypts and analyzes encrypted traffic. Allows detection and blocking of hidden threats.
Prevents attacks using fragmented packets. Reassembles and inspects them for security purposes.
Blocks attacks targeting web applications such as SQL injection and XSS. Provides basic web protection.
ePati Cyber Security Co.
Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY
Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39