FOB
Depend on quantity
The person in charge
Telephone
82-0220256900Fax
02-2025-9694Address
3F M Bldg. 221-5 Nonhyun-dong Gangnam-gu Seoul Korea, 서울특별시,0 / 4000
[ Product Description ]
To counteract to increasing end point security threats, it is necessary to install security measures for network access layer. TiFRONT is the most efficient solution, which features both L2 switching and security functions. It can serve for zombie PC prevention by interlocking with other authenticated server and devices.
Weak security for access level
For network security, enterprises have made big investment into security so far, putting their focus on “external attack” that threatens the key system like a server or DB so they cannot help to be exposed to various security threats, which can happen in the access level near the users’ PC. An attack happening in the access level is expanded to the whole network, not only the PC server in question, which can create a service trouble.
Recently, various security threats, which target for the access level, have been increasing, and under this circumstance, how to keep away security threats that are happening internally or how to fundamentally block them has become an important matter. The best solution to it is mounting “security” on L2 switch that is in charge of processing the access level network.
|
TiFRONT created by PIOLINK’s own technology
at the same time by use of Ethernet UTP communication cable. Dual power is available as an option. TiFRONT has been
developed through PIOLINK’s own technology for which hardware, OS, and security engine have been developed too. Construction customized to consumers’ environment, fast technical support, and prompt maintenance and repair are its strengths. |
|
![]() |
|
L2 switching and security |
![]() |
Prevention of damage by fundamentally blocking DDoS attack To prevent damage caused by DDoS, it is better to make a network environment with TiFRONT where zombies cannot spread or reproduced than to introduce a high-priced defensive equipment for DDoS to stop huge traffics happening in thousands or tens of thousands of PC. |
|
![]() |
Defense against ARP spoofing under UC environment Under unified communication (UC) environment equipped with Internet phone, wireless AP, and web camera, TiFRONT prevents call out or wiretapping through VoIP and protects privacy and important asset information. |
|
![]() |
Network stability guaranteed by preventing unauthorized users’ access TiFRONT blocks internal network connection of unregistered visitors’ notebooks or PC connected to false IP/MAC address. |
PIOLINK’s Cutting-edge Smart Security Engine: TiMatrix
A cutting-edge security engine applying mathematical frequency matrix accurately predicts the risk degree of packets.
-Applies intellectual/active evaluation variables according to the count types of each anomalous traffic.
-Optimized to attributes of access network packets through a frequency matrix method that has a high performance for forecasting future risks.
-Automated detection with combinations of each traffic for various variables.
-Detects DoS attacks and takes actions automatically.
Integrated equipment management and security control program: TiManager
Other companies’ EMS monitors only the conditions of equipment, but TiManager allows you to set security policy by switch and group. It especially provides 1 GB flash memory, which is first in the industry, to keep security logs so post analysis is possible. In addition, even when power is shut down, data are preserved so it plays the role of a black box.
1. Real-time dashboard
TiManager enables to grasp real-time traffic, status of security invasion, and user IP at a glance. It also shows a security log, equipment status log, and network configuration in real time.
2. Detailed Security Setting
You can impose security policy configuration for individuals or groups on TiFRONT. By designating IP/MAC port used for setting security policy for each port, you can limit usage duration and allow or block connections.
3. User IP Management Visualized Reports
You can grasp the following information: a user with an IP she/he used, the number of port used, a security switch used, and the date. You are also able to manage IP resources, control connections to terminal units, and view history with user authentication based on IP/MAC.
4.Visualized Reports
It issues reports on TiFRONT and information of authentic IP and outputs reports on hundreds of switches and information of IP connected to each port in categories, such as the status of traffic, security, or equipment.
Product Specification