Bluemax NGF - en
Bluemax NGF - en
Hardware Specification
BLUEMAX NGF 50 100 200 310 510 800 ED 1100 1300 1510 2100 5100 20000
CPU 2 Core 2 Core 4 Core 4 Core 8 Core 8 Core 4 Core 4 Core 10 Core 20 Core 32 Core 48 Core
Memory 4GB 4GB 4GB 8GB 8GB 8GB 8GB 8GB 16GB 32/64GB 64/128GB 96/288GB
System 16GB 16GB 32GB 64GB 128GB 128GB 128GB 256GB 256GB 128/256GB 128/512GB 128/512GB
Storage 1.92TB/ 1.92TB/ 1.92TB/
Log - - - 1TB 1TB 1TB 1TB 1TB 1TB
RAID RAID RAID
100GF - - - - - - - - - - (max2) (max4)
40GF - - - - - - - - - (max4) (max8) (max8)
Interface 10GF - - - - - - - (max4) (max4) 2(max10) 10(max26) 10(max26)
1GF - - - - 4 4 4(max8) 4(max8) 4(max8) 8(max40) 8(max40) 8(max40)
1GC 4 4+4 4+8 8 8 8 8 8 8 8(max40) 8(max40) 8(max40)
Power Supply Adapter Adapter Adapter Single Single Single Single Redundant Redundant Redundant Redundant Redundant
Throughput 1Gbps 2Gbps 4Gbps 8Gbps 12Gbps 14Gbps 16Gbps 18Gbps 40Gbps 80Gbps 160Gbps 320Gbps
Virtual Cloud Generation Firewall
CERTIFICATION
Call +82-80-331-6600
3-6F, 51 Jong-ro, Jongno-gu, Seoul (Jong-ro 2-ga, Jongno Tower)
www.secui.com
Copyright® SECUI All Rights Reserved. Names and product names published in this catalog are registered trademarks of SECUI. Specifications may change without notice for improvements.
Security Intelligence Platform for All My Threat Management
BLUEMAX NGF is Korea’s first next-generation firewall for virtual cloud network security and
provides an integrated security platform that detects and blocks all threats in the wired and
wireless IT infrastructure environment.
It can operate multiple firewalls with a single product through the virtualization function and
provides all next-generation firewall functions, ranging from stable high-performance and
high-availability HW architecture, application recognition, device recognition, support for
SD-WAN environment, and security functions to respond to the latest threats of DNS/VPN.
●
Integrated security in public and ●
Real-time device compliance
private cloud environments
Virtual Cloud Malware check, abnormal behavior and
●
Makes on-premise complex
security configuration efficient Security NETWORK Protection infection detection for preemptive
threat detection and blocking
with Virtual System SECURITY
●
Ensures traffic visibility
with app control
●
Prevents unauthorized access
through user authentication
●
Automates security policy
●
STIC: Smart Update, global settings by comprehensively
threat information service Threat Security analyzing information on
●
CSOC: AI-based threat analysis, Intelligence Automation collected threats, security logs,
remote control service and vulnerability diagnosis results
Response to new security threats
Google Naver
Branch Branch
Office Office
Mail ERP
HQ/Data Center
Zero Trust Network | Applies Zero Trust Network policy based on device security status, user ID, and app information
Inspection of Device and User Environment Zero Trust Network Access Control
DNS Security | Equipped with machine learning technology in firewalls to respond to unknown security threats
ML-based DNS
Technology
Internal Malware-Infected PC Normal DNS Server
SaaS Security | Web category-based application control and SaaS HTTP header control
GET / HTTP/1.1
Host: login.microsoft.com
Access Connection: keep-alive
Personal Account
SaaS
Deny User-Agent: Mozilla/5.0 (Windows NT 10.0)
Restrict-Access-To-Tenants: gmail.com
Main Function
Function to actively respond to attacks that are By recognizing user ID rather than IP,
difficult to handle using existing UTM by the same security policy is applied no matter
pre-defining and analyzing applications to when and where the network is accessed,
prevent increased vulnerabilities and distribution ensuring user mobility and enabling the user
of malware by domestic and foreign applications to view statistical data.
Equipped with the PQC algorithm, which is an Uses domain names instead of IPs as firewall objects,
internationally recognized next-generation collects up to 2,048 IPs per domain in real time and/or
encryption technology that can respond to periodically considering the cloud environment (portals,
attacks using quantum computers web hard drives).
Uses a global database classified into more When using the application, controls files by type
than 82 categories and requests a cloud (document, compressed file, image, multimedia, etc.)
server to analyze unknown URL information and direction to prevent unauthorized file transfers,
for updates to quickly block malicious URL internal information leaks, and external threats.
information.
Automatically detects SSL sessions, decrypts Operates seamlessly with integrated security
SSL packets, and applies them to various management systems, vulnerability diagnosis
next-generation network security functions. systems, and security policy analysis systems of
Improves performance compared to existing domestic and international vendors to implement
products by applying a hardware accelerator Security Orchestration & Automation.