{"id":923,"date":"2017-06-20T06:42:37","date_gmt":"2017-06-20T06:42:37","guid":{"rendered":"http:\/\/www.tng.com.sa\/?page_id=923"},"modified":"2017-07-20T04:10:14","modified_gmt":"2017-07-20T04:10:14","slug":"network-secuirty","status":"publish","type":"page","link":"https:\/\/tng-me.com\/TNG-ME\/network-secuirty\/","title":{"rendered":"Network Secuirty"},"content":{"rendered":"<div id=\"pl-923\"  class=\"panel-layout\" ><div id=\"pg-923-0\"  class=\"panel-grid panel-has-style\" ><div class=\"icon-row panel-row-style panel-row-style-for-923-0\" style=\"padding: 0px 0; \" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-923-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-923-0-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"0\" ><div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-923-0-0-0\" ><div id=\"pl-w59702d265fb68\"  class=\"panel-layout\" ><div id=\"pg-w59702d265fb68-0\"  class=\"panel-grid panel-has-style\" ><div style=\"padding: 0px 0; \" id=\"cyberoam\" data-overlay=\"true\" data-overlay-color=\"#000000\" class=\"panel-row-style panel-row-style-for-w59702d265fb68-0\" ><div id=\"pgc-w59702d265fb68-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 class=\"prod_orgh\" style=\"color: #443f3f;\">Network Security<\/h3>\n<p>Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network security industry, and since 2004 it has gained widespread currency as a primary network gateway defense solution for organizations. In theory, UTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single appliance: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data leak prevention and on-appliance reporting.<\/p>\n<p>TNG is a premier partner with Cyberoam.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w59702d265fb68-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm01.png\" class=\"image wp-image-925  attachment-full size-full\" alt=\"\" style=\"max-width: 100%; height: auto;\" srcset=\"http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm01.png 454w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm01-300x206.png 300w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm01-230x158.png 230w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm01-350x241.png 350w\" sizes=\"(max-width: 454px) 100vw, 454px\" width=\"454\" height=\"312\"><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-w59702d265fb68-1\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-w59702d265fb68-1\" style=\"padding: 1% 0; \" id=\"Cyberoam\" data-stretch-type=\"full\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-w59702d265fb68-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 class=\"prod_orgh\" style=\"color: #443f3f;\">Cyberoam Security Solutions<\/h3>\n<p>Cyberoam offers comprehensive network, web &amp; content, application and email security while providing secure remote access and data leakage prevention. Cyberoam\u2019s centralized management enables organizations to implement high levels of security with visibility across global locations.<\/p>\n<p>With Layer 8 Identity-based policies, Cyberoam offers strong protection while retaining business flexibility based on work profiles. By providing comprehensive security over a single appliance, it minimizes capital and operational expense and simplifies security implementation.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w59702d265fb68-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm021.png\" class=\"image wp-image-1417  attachment-full size-full\" alt=\"\" style=\"max-width: 100%; height: auto;\" srcset=\"http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm021.png 454w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm021-300x206.png 300w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm021-230x158.png 230w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm021-350x241.png 350w\" sizes=\"(max-width: 454px) 100vw, 454px\" width=\"454\" height=\"312\"><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-w59702d265fb68-2\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-w59702d265fb68-2\" style=\"padding: 0px 0; \" id=\"cyberoam\" data-stretch-type=\"full\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-w59702d265fb68-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 class=\"prod_orgh\" style=\"color: #443f3f;\">By Business Needs<\/h3>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-w59702d265fb68-3\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-w59702d265fb68-3\" style=\"padding: 0px 0; \" data-stretch-type=\"full\" data-overlay=\"true\" data-overlay-color=\"#000000\" ><div id=\"pgc-w59702d265fb68-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"5\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul>\n<li>Network Security<\/li>\n<li>Virtual Security<\/li>\n<li>Data Leakage Prevention<\/li>\n<li>Web &amp; Content Security<\/li>\n<li>Secure Remote Access<\/li>\n<li>Managing Bandwidth<\/li>\n<\/ul>\n<hr>\n<\/div>\n<\/div><\/div><div id=\"panel-w59702d265fb68-3-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"6\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 class=\"custom_sub_ha\" style=\"#FF6600;\">Network Size<\/h3>\n<\/div>\n<\/div><\/div><div id=\"panel-w59702d265fb68-3-0-2\" class=\"so-panel widget widget_sow-editor\" data-index=\"7\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul>\n<li>SOHO \u2013 ROBO<\/li>\n<li>Small &amp; Medium Enterprises<\/li>\n<\/ul>\n<hr>\n<\/div>\n<\/div><\/div><div id=\"panel-w59702d265fb68-3-0-3\" class=\"so-panel widget widget_sow-editor\" data-index=\"8\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 class=\"custom_sub_ha\">By Verticals<\/h3>\n<\/div>\n<\/div><\/div><div id=\"panel-w59702d265fb68-3-0-4\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"9\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul>\n<li>MSSP<\/li>\n<li>Banking &amp; Finance<\/li>\n<li>Government &amp; Defense<\/li>\n<li>Retail<\/li>\n<li>Education<\/li>\n<li>ISPs &amp; Email Service Providers<\/li>\n<li>Healthcare<\/li>\n<\/ul>\n<hr>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w59702d265fb68-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-3-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"10\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul>\n<li>Email Security<\/li>\n<li>Logging &amp; Reporting<\/li>\n<li>Centralized Management<\/li>\n<li>Application Security<\/li>\n<li>WAN Connectivity<\/li>\n<\/ul>\n<hr>\n<\/div>\n<\/div><\/div><div id=\"panel-w59702d265fb68-3-1-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"11\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<\/div>\n<\/div><\/div><div id=\"panel-w59702d265fb68-3-1-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"12\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul>\n<\/ul>\n<hr>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-w59702d265fb68-3-2\"  class=\"panel-grid-cell\" ><div id=\"panel-w59702d265fb68-3-2-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"13\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm03.png\" class=\"image wp-image-838  attachment-full size-full\" alt=\"\" style=\"max-width: 100%; height: auto;\" srcset=\"http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm03.png 454w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm03-300x206.png 300w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm03-230x158.png 230w, http:\/\/www.tng.com.sa\/wp-content\/uploads\/2017\/06\/utm03-350x241.png 350w\" sizes=\"(max-width: 454px) 100vw, 454px\" width=\"454\" height=\"312\"><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Network Security Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network security industry, and since 2004 it has gained widespread currency as a primary network gateway defense solution for organizations. In theory, UTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/tpl_without-btn-header.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/pages\/923"}],"collection":[{"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/comments?post=923"}],"version-history":[{"count":63,"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/pages\/923\/revisions"}],"predecessor-version":[{"id":1876,"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/pages\/923\/revisions\/1876"}],"wp:attachment":[{"href":"https:\/\/tng-me.com\/TNG-ME\/wp-json\/wp\/v2\/media?parent=923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}