Threats are continually evolving. Security defences must innovate to stay ahead.
Crystal Eye Firewall is an advanced security platform which features a range of integrated solutions to secure your organisation from the cloud to the endpoint.
Crystal Eye delivers a complete security solution in a single platform, eliminating the need for separate products from multiple vendors.
Simple Deployment & Management
With all your security technologies on the one platform, deployment is streamlined and our simplified managed services let you get on with business.
Running the latest Intel processers on our made-to-order hardware, we deliver the highest-performance firewall appliances available on the market. *
* See our True Security Throughput (TST) scores
A unified platform delivers a complete cybersecurity program with a lower total cost of ownership to suit your budget.
Our predictive and automated approach to security with Automated Threat Intelligence provides increased threat prevention.
- Security incidents are becoming more complex and more commonplace. Many organisations struggle to implement effective security protection and often don’t know where to start.
- Running a complete security program currently requires a mix from multiple products with significant integration effort. This leaves most organisations needing to compromise on their security or being left with poorly-configured systems that aren’t providing effective protection.
- A more progressive approach to security is required to overcome these issues with a simple, unified platform that can effectively protect, detect and respond to threats across your whole organisation.
- This requires a single platform from a trusted vendor who can deliver a suite of security products that can be used across the entire business including firewalls (with integrated IPS, secure web gateway and secure email gateway) plus vulnerability management, incident response and integrated risk management.
Crystal Eye secures your organisation from the cloud to the endpoint
with a range of advanced security technologies.
CRYSTAL EYE FIREWALL
Crystal Eye Firewall offers a range of integrated security controls such as Firewall, IPS, secure web gateway and secure email gateway in the following flexible deployment options:
- Cloud platforms – IaaS (AWS, Azure, TPG)
- Cloud-native – FWaaS
- On-premise appliances
No matter which deployment or appliance you choose, all customers get access to the same full-featured Crystal Eye platform.
Crystal Eye Cloud Firewall
We live in a world where systems, applications and data all reside natively in the cloud. Crystal Eye Cloud Firewall takes a cloud-first approach by providing comprehensive protection across your entire cloud footprint. Our advanced threat protection capabilities offer full coverage across your cloud attack surface with multiple points of presence and allow you to build private networks over the public Internet with a zero-trust policy to give you the assurance you need to do business in the cloud.
Crystal Eye On-Premise Firewall
Crystal Eye On-Premise Firewall is our hardware appliance that is deployed on-site and forms an essential foundation of our Total Security Platform with the same capabilities as Crystal Eye Cloud Firewall for your corporate network and branch locations. It features next-generation firewall capabilities with a suite of integrated security controls to protect you against the latest threats.
Crystal Eye applies Machine Learning capabilities for greater predictive protection, while our Automated Actionable Intelligence feeds into our professionally managed rulesets to help deliver advanced threat protection capabilities.
Our IPS engine has more than 43,000 rules which are managed and curated by our advanced SOC team to deliver some of the highest visibility in the industry. Combined with our superior hardware performance to process these rules, we can deliver increased visibility and better protection.
The Crystal Eye On-Premise Firewall appliance is the World's fastest security appliance, successfully achieving 60Gbps IPS throughput in the lab on a single 2U device and verified by IEEE test results. Our ability to process Gigabit traffic puts us ahead of the pack and importantly enables us to process encrypted traffic more effectively.
Our appliances are multi-core 10th Gen Intel systems that enable multi-threaded applications to use the underlying hardware for high security performance, even with all features enabled.
Our appliance hardware is made-to-order, which ensures that all customers get the latest hardware specifications instead of using yesterday's technology with standardized OEM hardware.
Even large organisations with a range of security products and a large security team often get it wrong because the products aren’t configured properly and the staff don’t know how to manage them effectively. Crystal Eye’s security capabilities are all integrated into a single platform and work straight out of the box to ensure you get the right protection from day one.
Integrated Vulnerability Management
Crystal Eye offers vulnerability tuning within the IPS engine to provide virtual patching against known vulnerabilities identified in your environment, which is further supported by multi-function deployment options such as the Web Application Firewall.
The minute you install Crystal Eye, it shows you the number of vulnerabilities that have been detected in your specific environment, then it shows you how many have exploits which was leaving you at risk and how many are now being protected by Crystal Eye.
The objective here is to focus on the small number of vulnerabilities, not just the large number of malware that exploit those vulnerabilities.
- Encrypted traffic metadata detection running on our multi-threaded, high-throughput engine delivers unrivalled network protection against both clear and encrypted threats without decrypting traffic.
- Integrated functionswork together intelligently, such as the IPS dynamically creating a firewall rule when it detects multiple attacks from the same IP address, to automatically block that address to shut down the attack source and reduce the load on the IPS engine.
- Zero Trust Network Access (ZTNA) is a security architecture that ensures only traffic from authenticated users and devices are granted access to applications. It reduces the risk of a data breach via a comprehensive approach which includes identity verification, user access control and network segmentation.
- Cloud Access Security Broker (CASB) delivers network-based and cloud-based security policy enforcement between users and cloud services via network segmentation to provide protection of SaaS applications.
- Identity & Access Management (IAM) provides greater control of users on your network and forms a critical part of ZTNA and CASB protection. Crystal Eye offers a standalone Active Directory (AD) instance or can be integrated with an existing AD using LDAP or OAuth.
- Agentless Application Whitelisting (AWL) blocks unwanted apps at the gateway to prevent them running on devices within the network.
- DNS.Insure provides DNS sink-holing and managed DNS to deliver advanced DNS protection across the network and bringing DNS back under enterprise control, increasing network visibility and control.
- ForceField identifies authentication failures across the network and blocks the source IP addresses of the failed login attempts to prevent brute force attacks and unauthorised access to systems.
- Zero-day Protection is delivered via our IPS engine which supports both vulnerability-facing signatures and threat-facing signatures to provide a more comprehensive level of protection.
- BYOD & IoT devices are protected with application filtering and protocol filtering at the gateway and network segments. On-premise protection is critical to cater for the expansion of IoT & BYOD across the enterprise. Our extensive security configuration capabilities deliver contextualised data across multiple security features dealing with encrypted traffic, including application-layer controls to manage IoT and BYOD to provide total visibility of the threats on your network.
- VoIP monitoring allows you to take control of voice traffic and Machine Learning will generate alerts when anomalies are detected. As the popularity of VoIP systems increases, they are being subjected to different kinds of intrusions, some of which are specific to such systems and some of which follow a general pattern of attacks against IP infrastructure. This app will monitor all VoIP traffic on your system.
- Deception capabilities allow you to create traps within your infrastructure by tagging decoys to trick attackers within your network for detection and notifications from internal attack vectors.
- Machine Learning (ML) delivers a range of automated defence features using defined playbooks to get you secure and compliant with little or no human intervention.
- User & Entity Behaviour Analytics (UEBA) uses ML to define behaviour profiles across network authentication (Kerberos), server connections (SSH) and file management (SMB) then alert when anomalies are detected to prevent attack pivoting.
- Threat Analysis & Threat Hunting is achieved by integrating various detection methods across the Crystal Eye platform to allow your security team, or ours, to pro-actively search security breaches, as well as being able to automate the threat hunting process via the platform.
- PCAP provides full packet capture (PCAP) support which allows for greater control and easy analysis.
- Security Plan Wizard guides novice users through the configuration of the Cystal Eye platform to simplify the setup and configuration process and can be used in conjunction with the risk audit functionality.
- Backup PC allows single nodes to use the Crystal Eye appliance for a local backup solution to simplify the backup and restore process.
- Integrated Risk Management gives you better control of your risk profile in real-time, by providing visibility of your entire organisation from on-premise staff to your remote workforce.
- Data Loss Prevention (DLP) allows you to tag documents within your environment and track if they are being copied or removed from your network as well as VOIP monitoring to minimise the likelihood of data being exfiltrated out of your organisation.
- Vulnerability Management covers vulnerability scanning and reporting as well as pro-active protection measures such as virtual patching to provide zero-day protection and reduce the operational burden on IT staff.
- Incident Response services seamlessly integrate alerts into Red Piranha’s managed services and professional services to provide rapid response to security incidents that occur across your network in real-time.
Extended Detection & Response (XDR)
XDR is an integrated security protection, threat detection and incident response platform. It involves the collection and correlation of event data from multiple security technologies that automatically trigger a coordinated response to secure your network. This all-in-one platform is pre-configured to be ready to go out-of-the-box, so it delivers a consistent level of security across your whole environment without the complexity of integrating products from multiple vendors. The key areas of an XDR solution are:
- Automated security protection
- Centralised data collection and correlation
- Coordinated and automated incident response
IRM – Integrated Risk Management
The Crystal Eye Integrated Risk Management solution provides an automated and integrated approach to meeting your compliance obligations. It pulls together relevant compliance information and controls from multiple points across your network into a central dashboard that allows you to manage and report on that information to ensure you're compliant to a range of standards and provides a snapshot of your compliance posture at a point in time. The key compliance areas it addresses include:
- Security Policy Managemen
- Awareness & Education
- Identity & Access Management
- Vulnerability Management
- Security Monitoring
- Incident Response
- BCM / DR
The compliance journey can be a pain-staking process that requires a log of investment in time and resources. Our IRM module automates the majority of the work required to achieve and maintain compliance, thereby significantly reducing the cost for your business to gain a competitive edge in the market.
Crystal Eye IRM can also be integrated into our eCISO (electronic Chief Information Security Officer) product and vCISO (virtual Chief Information Security Officer) service to deliver a comprehensive approach to Integrated Risk Management for your organisation.
THE CRYSTAL EYE DIFFERENCE
Crystal Eye delivers a range of unique benefits across our entire platform. Traditional firewalls focus on security protection, while Crystal Eye’s range of solutions offer automated protection, automated detection and automated response to security threats across your organisation:
CRYSTAL EYE INTEGRATED CAPABILITIES
The Crystal Eye firewall integrates into a range of other products to form the Crystal Eye Total Security Platform, including the following:
Crystal Eye Orchestrate
CE Orchestrate is the central management console that allows for monitoring and tuning of the Crystal Eye platform from a single interface for single and multi-tenanted scenarios at scale. Much more than just a dashboard – it’s the central component in delivering Security Orchestration, Automation & Response (SOAR) across your environment which enables you to protect the confidentiality, integrity and availability of your data.
The multi-tenanted capability also allows Managed Security Service Providers (MSSPs) to manage multiple clients from a single view to browse, filter and view clients by various metrics and track scheduled tasks. The dashboard also integrates into the IRM module to manage critical security and compliance reporting.
CE Orchestrate provides a single view of all of your Crystal Eye devices and end-points with a holistic view of all your security events and alerts. You can drill into any alert or alarm to see more detailed alert analysis, alert escalation and reports for further investigation. You can also edit the rule action directly from the alert allowing for more granular tuning of the system.
SASE – Secure Access Service Edge
With more applications and data in the cloud and more staff working remotely, there is an increased need for simple and secure access for users in any location to access services in any environment. SASE is an architecture which aims to solve this problem by extending the bounds of the traditional security perimeter by deploying networking and security functionality at the business operational edge. It integrates multiple network security technologies such as SD-WAN, application-level access control and security policy enforcement. Crystal Eye integrates our network protection with our end-point apps to provide strong protection both on-premise and out to remote devices.
SASE is the convergence of network and security as a service into a single stack that allows organizations to secure users and devices accessing any service in any location. Bi-directional, single pass security inspection of traffic allows organisations to decrypt once and apply security controls such as advanced threat protection, DLP and application control to the connection.
Crystal Eye SASE can be deployed in localised regions to create local points of presence (POPs) to establish a SASE environment. Crystal Eye offers multiple options in Australia and globally to achieve this. Crystal Eye is cloud agnostic, supporting AWS, Azure and other cloud environments to give you flexibility.
Crystal Eye XDR End-points
Our Secure Access Service Edge (SASE) App provides your remote users with a secure connection from their devices to the internet, back to the corporate network and to cloud-based apps, data and internet access. It provides comprehensive end-point protection for remote users and is a key foundation of the Secure Access Service Edge (SASE) model. ZTNA allows you to securely extend your private networks for client-to-site and site-to-site communication over the public Internet and protect your cloud environments.
Our Extended Detection & Response (XDR) App captures events and sends the relevant data back to the centralised XDR data processor to correlate and report on relevant security activity and incidents across your network. This integrates with the CESOC to assist in delivering an enterprise-wide view of your overall security posture. This also adds host-based XDR capability to the network-based XDR features to support the overall security orchestration approach.
Our Compliance App ensures devices on your network conform to security policies based on the Australian Signals Directorate's Information Security Manual (ISM) and the Essential Eight guidelines. Not only does it allow you to apply operating system policies across a range of devices, it also provides ongoing device monitoring to keep track of your compliance baseline in real-time. Ensuring compliance across devices on your network has traditionally been an onerous task requiring trained resources to implement and manage. The Compliance App can handle the majority of the device audit process through a series of automated features, so you don't have to. It also integrates into the Crystal Eye On-Premise Firewall and the CE IRM backend to close the loop on your end-point compliance requirements.
Our Digital Forensics & Incident Response (DFIR) App offers host-based forensics by collecting and reporting on malicious activity across devices on your network and is complemented by our post-breach consulting to support a rapid response during an outbreak and to assist in the efforts of understanding what has occurred during a breach, such as identifying the source and perpetrator of the attack.
This extends the coverage of the incident response team and the network-based DFIR capability provided by Crystal Eye On-Premise Firewall by also providing host-based data collection. This allows the Red Piranha team to work with your internal IT teams to rapidly respond to any incident with a comprehensive set of data. This delivers a very cost-effective solution for responding to an outbreak – achieving an Incident Response for a fraction of the typical cost for this type of service.
An Integrated Approach
The Crystal Eye Total Security Platform delivers a comprehensive solution across a range of security areas, with the whole platform working together to protect, detect and respond to threats in your environment. Together, this all works to provide a new level of threat protection, all integrated into a single defence-in-depth platform.
Our modular approach can be catered to meet the needs of each company, so you can pick and choose what matters most to you without implementing the whole solution. At the end of the day, it's not just about the technology – it's about managing risks specific to your needs. No matter what your budget or your capacity is, we have a solution to address your needs from SMBs to enterprises.
This is a conversation about managing security risks, not just deploying technical for technology's sake. We recommend starting with defining your required level of assurance, then looking at the most relevant technology to achieve that.
Crystal Eye products are available in a range of options to suit every budget.
- Get in touch
- Get a quote
- Get secure