Defense in Depth

Peplink technologies work together to generate a multi-layered defense against potential intrusions. To reach your network, attackers would need to defeat a battery of technologies, each defending a different part of the network from different forms of attack. Defenses are implemented on the client, router, SD-WAN, cloud, and administrative layers.

1.png__PID:381b519a-cdfe-40b4-8e2a-abff6247f286

Client Layer

The client layer covers devices that end users interact directly with, as well as AP that delivers Wi-Fi to such devices.

Router Layer

These features can also be virtualized on the cloud layer. Having them both on the cloud and on the router makes it possible to secure local Internet breakout as well as VPN traffic.

01.png__PID:60ee0728-0c59-4787-a46f-e0e348ec740b

Web Blocking

Each Peplink router has a dynamically updated web blocking tool that filters traffic into several categories. Users simply need to choose the categories they wish to block, and the router will take care of the rest.

5.png__PID:d8a262f4-0003-466c-8015-07ed235cf666

Scalable Firewall and Outbound Policy

Outbound Policy and firewall rules are only effective if they are usable. With Peplink gear, you can set firewall rules based on application, and even by country. With InControl, you can also centralize firewall rules and outbound policy for multiple devices.

4.png__PID:fbd8a262-f400-43f6-ac00-1507ed235cf6

DPI Application Filtering

For applications that cannot be recognized by First Packet Inspection, there is Deep Packet Inspection. Block popular distractions such as streaming sites, social media platforms, and instant messengers.

3.png__PID:d6fbd8a2-62f4-4003-b66c-001507ed235c

Intrusion Detection and DoS protection

Each Peplink router has a built-in DoS protection feature. Once enabled, it can detect and block abnormal packets as well as suspicious traffic typical of intrusion and denial of service attacks.

2.png__PID:39d6fbd8-a262-4400-83f6-6c001507ed23

Security Patches

There are always new threats and vulnerabilities to be discovered. When one emerges, Peplink will quickly develop and deploy new firmware to address the threats. We update firmware for our products years after they have been launched.

SD-WAN Layer

The SD-WAN layer covers the security of the data as it travels across WAN links. Peplink’s patented SpeedFusion technology provides a significant advantage on this layer.

Cloud Layer – FusionHub

FusionHub can be installed on cloud services for cloud-based security. Combined with a Peplink router, and you can secure both organizational VPN traffic as well as branch office Internet breakout.

7.png__PID:814efc82-08f6-479d-b972-304eaf91db46

Comprehensive Traffic Security

Use web blocking, firewall, outbound policy, DPI application filtering to control what type of traffic can access your network. Protect your entire network with Intrusion detection and DOS protection. Any security feature that our routers have can also be applied to the cloud.

6.png__PID:f6814efc-8208-4667-9d39-72304eaf91db

Tenant Segmentation

Our cloud appliance supports VRF, which divides the appliance into groups and holds a separate routing table for each group. The result: one cloud appliance can host several tenants, with each of them completely isolated from each other.

9.png__PID:fc8208f6-679d-4972-b04e-af91db460cec

Security Patches

When vulnerabilities appear, we swiftly develop patches and make them available to our users. These patches are available on our cloud services as well as our routers, securing your entire network.

8.png__PID:4efc8208-f667-4d39-b230-4eaf91db460c

3rd-Party Security Integration

Works together with your 3rd-party cloud-based security solution. Secure organization traffic with our security features, and secure public Internet traffic with the 3rd-party solution of your choice using IPsec or OpenVPN.

Administrative Layer

The human layer covers credentials carried by an organization’s team members. Countermeasures protect passwords and minimize the potential harm done by a breach.

Easy Reporting Mechanism
Reporting a bug is really simple: simply open a ticket, enter your details, and a Peplink engineer will get back to you within 24 hours. We also have a vibrant community forum regularly patrolled by our engineers and partners. Ask your question there to stimulate discussion and possibly development.

Standards Compliance
Peplink also has equipment and features that can fulfill the security requirements of important compliance bodies.

PCI DSS V3.2 Compliance For Secure Retailing
Companies who are dealing with credit card and payment information must meet the requirements set by the Payment Card Industry Data Security Standards (PCI DSS). Peplink routers are capable of meeting PCI DSS 3.2 requirements.

FIPS: North American Public Safety
Published by the U.S. National Institute of Standards and Technologies (NIST), the Federal Information Processing Standard (FIPS) is used by the U.S. government to approve cryptographic modules for encrypting network traffic. Peplink has a range of FIPS compliant products.

Comprehensive Protection
Use Peplink technology to build a resilient network that is protected from threats on multiple levels. Use SpeedFusion bandwidth bonding to implement bulletproof packet-level security. Use InControl centralized management to centralize security policy and make network security scalable and easy to manage. Contact one of our skilled Partners to get started.