Stream-based integration will make the devices highly efficient in their tasks

Oct 18, 2011 14:05 GMT  ·  By

The next generation firewall designed by Adyton will incorporate Bitdefender's anti-malware technology, hoping to offer an enhanced level of protection to networks that deploy the device.

"The sophistication of malware writers to hide malware in legitimate application is quickly changing the landscape. We looked at several companies and chose Bitdefender for its strong detection rates and industry reputation,” revealed Martin Menschner, CTO for Adyton Systems.

“Bitdefender anti-malware technology easily integrated into our architecture which allowed us to integrate the stream based approach forNetwork Protector, our next generation firewall.”

The anti-malware technology Menschner is talking about is known world wide as being one of the best in the industry. By integrating it in a stream-based fashion they hope to overcome the file size limitations of legacy network security solutions, while maintaining the packet order.

Network Protector is a device that can protect up to 10,000 computing machines, the tasks it performs making the difference between a secure and an exploitable network. It analyzes internet traffic in search for malicious elements which are immediately blocked once they're detected.

"Malware threats are constantly changing and becoming more sophisticated. We welcome the efforts of Adyton Systems to build the next generation network security solution that uses a high performance deep inspection engine combined with Bitdefender's StreamDefender technology to protect the networks from malware in real-time while maintaining the network performance.” said Peter Laakkonen, BitDefender’s General Manager of OEM and Technology Licensing.

While Bitdefender is know around the world, not many people know that Adyton is a German company, with its headquarters being located at Leipzig. They mostly provide easy-to-use products that can help companies, small and large, in their task of defending their digital assets against outside threats.

The efficiency of their products is obtained from the use of the deep packet inspection (DPI) engine that allows for an enhanced application visibility and control.