Managed Firewall


The Internet has become the obvious choice for most companies and organizations to communicate with. Most companies and organizations provide network access through the Internet to mobile employees, partners, suppliers and customers. This creates security holes. For companies and organizations to effectively protect themselves and their important information, buy most often in the newest firewalls. For a firewall to be effective, it must be configured, managed, monitored and updated regularly.

To keep intruders away while the daily business work required a comprehensive set of safety rules and constant monitoring to ensure that your system and your data is protected.
This can be an extremely costly operation, and economically costly.
By letting GNS manage and monitor the operation out of your firewalls, you get configuration changes, monitoring and upgrades, so you will never be exposed to external threats due to your branddväggar is wrong configured, not updated or is wrong configured.

GNS Managed Firewall protects your organization and monitored 24/7 days a week.

When necessary, we work with your in-house IT staff and provides analyzes, change / create configurations as well as work proactively to threats.
We work with most firewalls such as Cisco, Check Point, Dell SonicWall, Juniper, Sophos, WatchGuard, Fortinet, Palo Alto Networks and F5.

You can choose to rent it as a service from us when we deliver a complete set of clustered firewalls. As well as smaller firewalls to any small office. You have to rent everything smoothly as a service and we make sure that your firewall is always fully updated and that all license and support contracts are renewed on time.

Or we can smoothly take over the operation out of your existing firewalls.

You will receive:

  • 24/7 proactive monitoring
  • firewall Support
  • Backup and Recovery
  • Unlimited policies, rule sets, and changes (including validation)
  • configuration changes
  • Patch and upgrades
  • Device Management (availability, uptime, general maintenance)
  • Monthly Status Overview



Provide secure access to business critical applications and data to a wide range of smartphone, tablet, laptop and desktop devices. It does not matter if your mobile device is "managed" or unmanaged, "so can a security policy is created and maintained to enable mobile and remote employees, partners and contractors to access only the data they are allowed and only from trusted entities .

SSL VPN has some unique properties compared with other existing VPN technology. What is most noticeable is that SSL VPNs use SSL VPN SSL protocol, Transport Layer Security (TLS), to provide a secure connection between remote users and the internal network resources. Today exist the SSL / TLS function everywhere in modern browsers. Unlike traditional IP Security (IPsec) remote access VPN technology, which requires the installation of the IPSec client software on a client computer before a connection can be established, users normally do not need to install client software to use SSL VPN. As a result, SSL VPN also known as "clientless VPN" or "web VPN."

Another advantage of the SSL VPN over IPSec VPN is the ease of use for the end user. Various IPSec VPN vendors may have different requirements for implementation and configuration. SSL VPN, the other hand, only requires a modern browser. End users can also select their favorite web browser without being limited by the operating system.

Another benefit of SSL VPN is when users are located in places where the outbound traffic is regulated and they do not allow IPsec anslutnignar out. In most environments, allowing you always HTTPS (443) traffic outside which means you can use SSL VPN.

We offer SSL VPN as a service.

Contact us for a discussion.