A firewall only functions as well as its set of policies

Next Generation Firewalls (NGFW), an essential part of your ICT security. It is the protective barrier between your ICT network and external influences. With the right choice of firewall and smartly set policies, your ICT network is optimally secured.

Request your free consultation


What does a Next Generation Firewall do?

A Next Generation Firewall monitors and regulates incoming and outgoing network traffic based on a preset set of firewall policies. It analyzes the data packets passing through the network and blocks or allows specific connections based on these set rules. The security policies are used at both application and port and protocol level.

Firewalls in office and cloud

A firewall protects against various threats, such as unauthorized access, malware, viruses and outside attacks. It prevents malicious persons or malicious software from entering the network and stealing or damaging sensitive data. In addition, the firewall protects users of the internal network from visiting malicious websites.

Firewalls in your cloud or hybrid environment

A secure cloud or hybrid environment? Even then, the right firewall is crucial to protect the internal ICT network as well as the connections to external cloud services and SaaS applications.

A properly configured firewall ensures that your data traffic between the internal network and the cloud is secure and controlled. It controls access to the cloud services and SaaS applications based on the set rules and policies.

Users deserve protection against various threats, even if the main software is SaaS applications. The firewall helps prevent unauthorized access to these applications and detect any malicious activity.

Choose the right firewall

You don't have to do it alone to implement the right firewall solutions and take the necessary protective measures. You can rely on our in-depth knowledge of and years of experience with complex ICT environments. Expert advice and guidance in choosing the right firewalls (hardware/software) ensures that you are in control of your IT-network's security. We are also your partner for the installation, configuration and drafting of the correct policies for your firewalls.

Our focus is on providing tailored advice, ensuring your IT security and simplifying the process for our customers. With our expertise and support, you can confidently leverage the power of Next Generation Firewalls to optimally protect your corporate network.

Request your free consultation

Firewall technology

Next Generation Firewall technology includes various techniques to increase the security level of your IT environment. A brief overview:

Control IT network traffic

  • Intrusion Prevention System (IPS)
  • Deep packet Inspection (DPI)
  • Anti Virus

Safe on the internet

  • Web filtering
  • SSL Inspection
  • Safe search

And more

  • SD-WAN
  • Site-to-Site & remote access VPN
  • Anti Spam

Privacy and your cloud environment

To properly protect privacy-sensitive data in your (private) cloud, you must take additional measures. By, among other things, encrypting data, implementing strong access controls and regularly monitoring network traffic to detect suspicious activities.

It is very important that your cloud provider meets the required security standards and that there are clear agreements about the responsibilities with regard to data protection. Carefully evaluate what data is stored in the cloud and what measures are needed to ensure the confidentiality, integrity and availability of that data.

Frequently asked questions

What is WiFi?

WiFi is a wireless network technology that allows you to connect to other devices or the internet. The wireless connection is created by using radio waves in the 2.4GHz and 5GHz bands.

The use of WiFi is license-free. This means there are no costs associated with the use of WiFi frequencies, unlike, for example, 4G/5G.

Thanks to WiFi, you can easily connect more and more different devices with each other and/or the internet. This allows devices such as laptops, tablets, telephones (VoIP), scanners, cash registers, heating installations, cameras, alarm systems, production machines, digiboards, etc. to communicate quickly and easily.

(By the way, the term WiFi was once coined by a marketing agency.)

What is VoIP?

VoIP stands for Voice Over Internet Protocol (IP). Loosely translated, this means speech over IP (network connection). It is also known as IP telephony or Internet telephony.

In the past, telephony consisted of national cabling. The challenge was that a copper connection was required from A to B to be able to transport speech between two participants. Due to the great distances, all kinds of intermediate stations and amplifiers were needed.

At one point someone came up with the idea of ​​packing speech into very small 'samples' as data and sending that in IP 'packets' over a network connection. This allows speech to be sent over anything that supports IP, such as WiFi, Ethernet, the Internet, etc.

The big advantage is that VoIP makes use of the existing ICT network, so that one technology can transport data and speech. This means less equipment and less cabling.

In fact, cables are not always necessary, because VoIP also works wirelessly with well-designed WiFi networks (hyperlink). The old-fashioned telephone exchanges are being replaced by software on a server. Simplicity, flexibility and mobility - because it also works for WiFi - are key features of VoIP.

With VoIP, it is very important that the network is properly designed and set up for Quality of Service (QoS) so that the calls are of good quality.

What is WPA3 security?

WPA3 is a new and stronger security protocol for modern wireless networks (WiFi). The term stands for WiFi Protected Access.

Thanks to modern encryption methods (Simultanious Authentication of Equeals - SAE), increased security is ensured. This encryption prevents passwords for your WiFi network from being tried through with the help of word lists.

Other security functions are also mandatory, such as PMF (Protected Management Frames). This creates a more secure exchange of data during the logon phase between the client and the WiFi network (controller).

What is MU-MIMO?

WiFi 6 enables MU-MIMO. It stands for “Multi-User Multiple-Input, Multiple-Output”.

Its predecessor MIMO, which stands for “Multiple-Input, Multiple-Output”, is a technology originally introduced with the WiFi 5 standard. Thanks to MIMO, bandwidth can be split so that devices (clients) can communicate with a WiFi Access Point (AP) simultaneously.

With the MU-MIMO technology, the WiFi channels can be used even more efficiently. In addition, MU-MIMO with WiFi 6 is available in both the downlink and uplink, while with WiFi 5 Wave2, the MU-MIMO was only available in the downlink.

With WiFi 6, a total of 12 streams are available (5GHz = 8 streams, 2.4GHz = 4 streams) compared to WiFi 5 where only 8 streams on only the 5GHz band were available.

What is OFDMA?

OFDMA stands for Orthogonal Frequency Division Multiple Access. This channel access method has been available since WiFi 6 (link) and has a double advantage:

On the one hand, a channel can be divided into even more sub-channels than before. Alternatively, the distribution of one or more subchannels can be assigned to one or more clients.

If a client uses little bandwidth, the remaining bandwidth can be used for other clients. Only WiFi 6 has this channel access method.

Which WiFi equipment can I use best?

The choice of brand and type of hardware is determined by the combination of price and quality. The required quality is determined by the ICT-environment, (the number of) expected users, applications en so much more. Please contact our WiFi specialists, they will help you select the best choice.

When do I need an ICT network specialist?

Please contact Procyon Networks if you:

  • Have questions about anything related to the ICT-network field regarding current or future challenges.
  • Want to be sure that the ICT-network works well and continues to function well.
  • Want independent advice on data communication.
  • Want to offer your ICT-team the best management tools and/or have them expand their knowledge through training. 

Get in touch?

Please leave your details and we will contact you!

Created by