What is discrimiNAT Firewall?

The discrimiNAT addresses the challenge of not being able to specify hostnames or fully qualified domain names (FQDNs) in Google Cloud Firewall Rules and AWS Security Groups, facilitating efficient and scalable egress filtering. Utilizing a Deep Packet Inspection engine, it oversees and restricts traffic without the need for decryption, serving as a highly available NAT Instance at the egress point of your VPC network. Designed with user-friendliness in mind, you only need to input the allowed destination FQDNs in your applications' outbound rules, and the firewall takes care of the rest without any hassle. To appreciate its ease of use, feel free to watch the concise video demonstrations provided. Our solution accommodates everything from fully integrated multi-zone network configurations that can be launched with a single click, complete with practical defaults, to customizable instance setups, giving users the flexibility to adapt their networking arrangements as desired. Furthermore, we supply an extensive array of ready-to-use templates in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud, ensuring that users can quickly implement robust and effective security solutions. This approach not only enhances security but also streamlines the process of managing network configurations across different platforms.

Screenshots and Video

discrimiNAT Firewall Screenshot 1

Company Facts

Company Name:
Chaser Systems
Company Location:
United Kingdom
Company Website:
chasersystems.com/discrimiNAT/

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Online Training
Support
24 Hour Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

discrimiNAT Firewall Categories and Features

Network Traffic Analysis (NTA) Software

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Firewall Software

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification