Out of the box zero conﬁgurationsecure VPN, IP obfuscation, captive portal isolation and unlimited secure web access. Silent Edge is for companieswho require zero touchsecurity from wherever their users are
With the GoSilent Edge Protection Suite, you have a remote network access and defense solution that offers:
Advanced Threat Protection
Inspect all traffic for a wide range of threats. Detect and prevent exposure to malicious and phishing websites and reduce advertisement traffic.
Application Visibility and Control
Identify thousands of different applications to set up effective application-aware policy enforcement, plus support custom applications
Next Generation Secure Access
Top Secret (TS) level, quantum resistant VPN for privacy, plus protect users and the Enterprise from active and passive reconnaissance.
Fully-functional REST API enables you to share and apply threat intelligence with existing solutions, integrate into existing management and reporting suites,etc.
Policy Management and Reporting
Maintain cyber situational awareness across your Enterprise through custom dashboards and reports, and easily remediate violations of your Enterprise policy.
Granular Auditing and Logging
Easy to consume network security events and log data to reduce workload on existing log management and SIEM solutions.
Your choice of deployment: hosted or server
GoSilent may be deployed with a Silent Edge cloud server or with the GoSilent Server. Using the cloud deployment a user can access Internet resources from an untrusted region in the world. GoSilent secures a connection to the Silent Edge cloud server (which resides in a trusted region) and creates a secure “IPsec tunnel”. The user’s online activities transmit through this secure connection to a region that is considered more trustworthy, before allowing those requests to hit the open Internet. This removes the possibility of the connection being hijacked in the untrusted region.
Enterprises interested in full control leverage the GoSilent Server. When using the GoSilent server, an enterprise can provide secure access to resources that are behind its enterprise firewall. As illustrated below, GoSilent secures a connection to the enterprise server and creates a secure “IPsec tunnel” inside the enterprise firewall. Users can securely access corporate resources without being exposed to attack over an open WiFi connection or open Internet. The GoSilent Server also securely communicates with IoT devices in the field. Once GoSilent secures a connection to the enterprise server and creates a secure “IPsec tunnel” inside the enterprise firewall, IP-enabled devices can then securely retrieve or send and store data behind the corporate firewall.