Skip to the main content.

Managed Firewall Service

Control, protection & operation

Our Managed Firewall Service offers comprehensive control over the entire policy lifecycle and changes. Functions such as IDS/IPS and application control provide in-depth protection at network and application level. Compliance reports create transparency, while 24/7 operation ensures continuous protection of your infrastructure.

Firewall
Features / advantages at a glance

Policy Lifecycle

Changes according to SLA

IDS, IPS and Application Control

High Availability

Compliance reports

Firewall solution

What you can expect

Our Managed Firewall Service delivers and operates your next-generation firewall as a fully managed service. You benefit from reliable protection, stable operation and clear responsibilities - around the clock.

Round-the-clock monitoring by the NOC and safety-critical incident detection by the SOC.

Lifecycle

From creation to regular review

Prevention

IPS/SSL: Protection through intrusion prevention and monitoring of encrypted connections

High availability

Through redundant systems in active/standby mode

Compliance

Documented security measures for internal and external audit requirements

Technology in detail

Secure network boundaries:
RIEDEL Networks provides the firewall, implements approvals and rules and maintains the set of rules over the entire runtime.

Controlled changes:
Adjustments are structured and documented, for consistent, auditable policies.

Round-the-clock service:
The Network Operations Center monitors operations, deploys updates in maintenance windows and adheres to agreed service levels.

Transparency & availability:
Reports show events, changes and compliance. High availability and failover tests are possible.

Education

Network Security

Secure & Tailor-Made

Our solutions offer managed services with 24/7 monitoring, configuration management and incident handling. They are individually tailored to your infrastructure and are optimally prepared for hybrid and multicloud-capable corporate networks.

Centrally controlled firewall for intelligent network security

Standardized security management for modern networks

Firewall management

Standardized firewall management

With our cloud-native management console, you can keep track of your firewalls at all times, regardless of the manufacturer. Thanks to AI-supported support in the creation and maintenance of policies, operation is not only more efficient, but also more intelligent. The central interface enables simple, intuitive management, while automated processes based on intentions ensure that security policies are implemented consistently and in a targeted manner.

Modern protection

Modern threat protection

Our solution detects attacks in real time and blocks them reliably - before any damage is done. The integrated intrusion prevention works hand in hand with intelligent malware protection and precise URL control. All components are closely interlinked with traffic inspection to ensure comprehensive, multi-layered protection at all levels.

Application detection

Comprehensive application detection

Get full visibility across thousands of applications for more control and security. Precise detection allows you to define policies more specifically, identify risks at an early stage and protect resources more efficiently. This not only makes your security strategy more transparent, but also significantly more effective.

Decryption

Visibility without general decryption

Even without full TLS decryption, you retain control: By viewing certificate information and targeted policies at an early stage, applications and URLs can be reliably controlled, even with encrypted traffic according to TLS 1.2 or 1.3. This means that visibility is maintained, even if full decryption is not practicable from a technical or data protection point of view.

Data analysis

Inspect QUIC traffic

Even modern protocols such as QUIC do not remain unseen: Deep packet inspection and targeted policies allow data traffic to be effectively analyzed and controlled. Optimized processing ensures high efficiency while maintaining consistent security at all levels.

Zero trust

Universal Zero Trust access

Access is consistently based on identity, context and device status, without the need for complex network modifications. SSE and firewall policies originate from a central platform and can be managed uniformly. Even in the event of disruptions in the cloud, direct access to applications is maintained.

Protection

Securing IoT and OT environments

Critical infrastructures are reliably protected by a deep understanding of protocols and targeted access controls. Unauthorized connections are effectively prevented - IT and OT environments remain transparent, secure and centrally controllable.

Activities analysis

Track and analyze activities

Network telemetry data is intelligently aggregated and converted into meaningful security analyses. Seamless integration with analytics platforms and SIEM systems provides in-depth insights for operations, monitoring and strategic security management.

Frequently asked questions

Here are some of the most frequently asked questions we receive.

Get started today!

Our Solution Architects will be happy to have an initial discussion with you. When it comes to network security, one basic rule applies: it's always better to start than to put it off!