Managed Firewall Service
Control, protection & operation
Our Managed Firewall Service offers comprehensive control over the entire policy lifecycle and changes. Functions such as IDS/IPS and application control provide in-depth protection at network and application level. Compliance reports create transparency, while 24/7 operation ensures continuous protection of your infrastructure.
Features / advantages at a glance
Policy Lifecycle
Changes according to SLA
IDS, IPS and Application Control
High Availability
Compliance reports
What you can expect
Our Managed Firewall Service delivers and operates your next-generation firewall as a fully managed service. You benefit from reliable protection, stable operation and clear responsibilities - around the clock.
-
Policy design and regulations
The zone model and basic protection rules form the basis for structured and secure network segmentation. Change requests are controlled via clearly defined processes, for consistent security and traceable adjustments.
-
Operation and monitoring
RIEDEL Networks continuously monitors the status of your firewall appliance. This means that potential faults are detected at an early stage and operation remains stable and reliable.
-
Changes, patches and lifecycle
Configuration changes are planned and controlled within defined maintenance windows, for maximum stability and minimum operational disruption.
Round-the-clock monitoring by the NOC and safety-critical incident detection by the SOC.
Lifecycle
From creation to regular review
Prevention
IPS/SSL: Protection through intrusion prevention and monitoring of encrypted connections
High availability
Through redundant systems in active/standby mode
Compliance
Documented security measures for internal and external audit requirements
Technology in detail
Secure network boundaries:
RIEDEL Networks provides the firewall, implements approvals and rules and maintains the set of rules over the entire runtime.
Controlled changes:
Adjustments are structured and documented, for consistent, auditable policies.
Round-the-clock service:
The Network Operations Center monitors operations, deploys updates in maintenance windows and adheres to agreed service levels.
Transparency & availability:
Reports show events, changes and compliance. High availability and failover tests are possible.
Network Security
Secure & Tailor-Made
Our solutions offer managed services with 24/7 monitoring, configuration management and incident handling. They are individually tailored to your infrastructure and are optimally prepared for hybrid and multicloud-capable corporate networks.
Centrally controlled firewall for intelligent network security
Standardized security management for modern networks
Standardized firewall management
With our cloud-native management console, you can keep track of your firewalls at all times, regardless of the manufacturer. Thanks to AI-supported support in the creation and maintenance of policies, operation is not only more efficient, but also more intelligent. The central interface enables simple, intuitive management, while automated processes based on intentions ensure that security policies are implemented consistently and in a targeted manner.
Modern threat protection
Our solution detects attacks in real time and blocks them reliably - before any damage is done. The integrated intrusion prevention works hand in hand with intelligent malware protection and precise URL control. All components are closely interlinked with traffic inspection to ensure comprehensive, multi-layered protection at all levels.
Comprehensive application detection
Get full visibility across thousands of applications for more control and security. Precise detection allows you to define policies more specifically, identify risks at an early stage and protect resources more efficiently. This not only makes your security strategy more transparent, but also significantly more effective.
Visibility without general decryption
Even without full TLS decryption, you retain control: By viewing certificate information and targeted policies at an early stage, applications and URLs can be reliably controlled, even with encrypted traffic according to TLS 1.2 or 1.3. This means that visibility is maintained, even if full decryption is not practicable from a technical or data protection point of view.
Inspect QUIC traffic
Even modern protocols such as QUIC do not remain unseen: Deep packet inspection and targeted policies allow data traffic to be effectively analyzed and controlled. Optimized processing ensures high efficiency while maintaining consistent security at all levels.
Universal Zero Trust access
Access is consistently based on identity, context and device status, without the need for complex network modifications. SSE and firewall policies originate from a central platform and can be managed uniformly. Even in the event of disruptions in the cloud, direct access to applications is maintained.
Securing IoT and OT environments
Critical infrastructures are reliably protected by a deep understanding of protocols and targeted access controls. Unauthorized connections are effectively prevented - IT and OT environments remain transparent, secure and centrally controllable.
Track and analyze activities
Network telemetry data is intelligently aggregated and converted into meaningful security analyses. Seamless integration with analytics platforms and SIEM systems provides in-depth insights for operations, monitoring and strategic security management.
Frequently asked questions
Here are some of the most frequently asked questions we receive.
-
Who monitors and who alerts?
The NOC monitors the appliances; optionally, the SOC correlates security events and alerts in the event of critical findings.
-
How do changes and updates work?
Planned in the maintenance window.
-
Can we use co-management?
Yes, graduated roles/releases enable collaboration without loss of quality.
-
Do you support virtual/cloud firewalls?
Yes, physical, virtual or cloud-native - according to design specifications.
-
How transparent is the billing?
Monthly service fee, add-ons and project services are shown separately.
Get started today!
Our Solution Architects will be happy to have an initial discussion with you. When it comes to network security, one basic rule applies: it's always better to start than to put it off!