Interlaced Technology provides a browser-based, responsive and intuitive interface enabling you to quickly gain visibility into the traffic on the network. From content filtering to advanced threat protection, VPN connectivity to application-based shaping for bandwidth optimization, Interlaced Technology delivers a comprehensive, enterprise-grade network security platform for organizations in any industry.
Security, Visibility & Control
Comprehensive Security at the Gateway
Proactively stop malware, hacking attempts, phishing schemes and other threats before they reach users’ devices.
Deep Analysis and Insights
Gain insights in real time from database-driven reports without the need for a separate appliance. See the network status at a glance on the dashboard, ensure compliance with full event logs, and get notifications of network anomalies or unusual user behavior with alert rules.
Command Center gives you visibility into all of your NG Firewall deployments and the ability to access them remotely from a single login and central management view. Zero touch provisioning makes it easy to deploy appliances without physical access. Configure and push policy templates, create global alerts, view real-time information on hosts, and initiate an endpoint security scan.
Get a handle on every rogue application, encrypted web request, malware distribution point, drive-by malvertising attempt, and rash of spam.
Superior Connectivity & Performance
Meet the challenges of a remote workforce, branch offices and guest Wi-Fi. Keep users and data safe regardless of location or level of access. Balance competing priorities, ensure Quality of Service (QoS) and maximize uptime while saving the organization money.
Cyber Threat Intelligence
ScoutIQ™ cyber threat intelligence aggregates anonymous telemetry information across files, URLs, and IPs observed across NG Firewall deployments and performs detailed threat analyses across all traffic types seen on today’s networks, providing a second layer of defense and superior protection against unknown and emerging threats.