Smarter AI-Powered Defense

Sangfor Network Secure (previously known as NGAF) takes Next Generation Firewall technology to the next level to meet the evolving security needs of modern enterprises. Through market foresight and technical prowess, Sangfor Network Secure holds several “world’s first” titles.

  • The world’s 1st AI-enabled NGFW with intelligent detection, eliminating over 99% of external threats at the network perimeter.
  • The world's 1st NGFW integrated with Web Application Firewall (WAF) to provide network and web application security in one appliance.
  • The world's 1st NGFW integrated with deception technology to provide proactive detection and mitigation of malicious actors. 
  • The world's 1st NGFW with built-in SOC Lite that helps security teams rapidly determine the security status of threats and respond.  
  • The world's 1st NGFW that truly integrates with endpoint security and NDR solutions to create a holistic security system.
Click Here to Watch the Video
Click Here to Watch the Video

Sangfor Network Secure Key Features & Capabilities

Malware Detection

Sangfor Network Secure integrates with Sangfor Engine Zero, an AI powered malware detection engine. Engine Zero is developed using machine learning models and AI algorithms. This enables Network Secure to deliver 99.76% detection rate of known and unknown malware across the internet.

Threat Intelligence

Sangfor Network Secure integrates with Sangfor Neural-X, a cloud-based AI powered threat intelligence and analytics platform.

Neural-X is constantly updated to protect against the latest indicators of compromise (IOC) and adversary tactics, techniques, and procedures (TTPs). For example, Network Secure can send a suspicious DNS address to Neural-X for verification. If Neural-X classifies this DNS as a known C&C server, Network Secure automatically blocks these communications so that no further damage is caused.

Cloud Deception

Sangfor Network Secure is the first NGFW with built-in deception technology. It takes administrators just 5 minutes to set up decoys that proactively locate and stop malicious actors and lateral movement.

Web Application Firewall (WAF)

Sangfor Network Secure is integrated with Sangfor NG-WAF, a next generation web application firewall designed to offer robust protection to web applications.

Using semantic analysis and the industry’s first WAF with a built-in virtual execution system (VES), Sangfor WAF protects web applications from the most advanced web application attacks, such as SQL injection and cross-site scripting.

SOC Lite

Sangfor believes the firewall should make life easier for security administrators. Sangfor Network Secure integrates a SOC Lite feature to simplify security operations and incident response.

Instead of analyzing tons of security logs, security administrators can intuitively determine the current threat level of users and hosts via the Network Secure GUI. What's more, Network Secure provides users with essential guidance on how to respond to security threats.

Anti-Ransomware

Sangfor Network Secure integrates with Sangfor Endpoint Secure (Endpoint Detection and Response - EDR) and Cyber Command (Network Detection and Response – NDR) as part of Sangfor’s Anti-Ransomware solution.

Forensic threat intelligence data, collected from the network and endpoints, visualizes the hidden ransomware process through the GUI and provides "one-click quarantine" to eradicate the encryption-controlling application from all infected hosts.
 

Sangfor Network Secure Use Cases

Robust Perimeter Security

Robust Perimeter Security

Sangfor Network Secure is a next generation firewall built in with various security features and capabilities, including antivirus, intrusion prevention system, and application control. Integration with an AI-powered malware detection engine and real-time threat intelligence platform ensures that Sangfor Network Secure blocks over 99% of threats at the perimeter.

Ransomware protection

Ransomware Protection

Sangfor Network Secure is an essential component of Sangfor’s Anti-Ransomware solution, which integrates Sangfor’s suite of security products to break every step of the ransomware kill chain.

Web Application Security

2nd Tier Firewall

Supplement your existing firewall with a next generation firewall equipped with AI-powered threat detection, the latest threat intelligence, NGWAF, and cloud deception, making it more challenging for attackers to penetrate the network.

Secured SD-WAN & WFX

Secured SD-WAN

Sangfor Network Secure utilizes smarter SD-WAN and Sangfor Access Secure (SASE) together with enterprise-level protection. This secures access for various scenarios, including HQ-to-branch, branch-to-branch, and work-from-anywhere (WFX).

Sangfor Network Secure Awards & Achievements

Gartner Magic Quadrant

"Visionary" Vendor

Recognized as "Visionary" vendor in 2022 Gartner Magic Quadrant for Network Firewalls

Gartner ‘Voice of the Customer’ icon

Gartner ‘Voice of the Customer’

Customers Speak through Gartner® Peer Insights™

ICSA Labs Certification icon

ICSA Labs Certification

Tested and Proven for Total Security, Endorsed by ICSA Labs in 2021

AAA Rating from CyberRatings icon

Recommended Rating from CyberRatings

The Top Rating in CyberRatings’ Enterprise Firewall Test

Frost & Sullivan 2023 Company of the Year

Frost & Sullivan Company of the Year

Frost & Sullivan recognizes Sangfor with the 2023 Company of the Year Award

Cybersecurity Excellence Awards icon

Cybersecurity Excellence Awards

Sangfor recognized by the 2022 Cybersecurity Excellence Awards

Network Secure Next Generation Firewall Product Models

Models NSF-1050A-I NSF-1100A-I NSF-3100A-I NSF-7100A-I
Firewall Throughput1, 2 10 Gbps 20 Gbps 30 Gbps 70 Gbps
Application Control Throughput1, 3 6 Gbps 12 Gbps 20 Gbps 40 Gbps
NGFW Throughput1, 4 1.5 Gbps 3 Gbps 7 Gbps 25 Gbps
Threat Prevention Throughput1, 5 820 Mbps 1.5 Gbps 3.6 Gbps 15 Gbps
Web Application Protect Throughput1, 6 950 Mbps 2.3 Gbps 3.2 Gbps 20 Gbps
IPsec VPN Throughput1, 7 600 Mbps 1.5 Gbps 3.5 Gbps 10 Gbps
Max IPsec VPN Tunnels 100 1,000 4,000 20,000
Concurrent Connections 800,000 2,000,000 4,000,000 25,000,000
New Connections 20,000 90,000 180,000 600,000
Virtual Domains (Recommended/Max) 1/6 3/6 5/10 24/48
Click to Download pdf file pdf file pdf file pdf file

Remarks

  1. All throughput performance data is measured in the laboratory. The performance may vary depending on the actual configuration & network environment.
  2. Firewall Throughput is measured with 1518 Bytes UDP packets.
  3. Application Control throughput is measured with firewall and Application Control enabled. 64K HTTP packets
  4. NGFW Throughput is measured with Firewall, Application Control, Bandwidth Management and IPS enabled. 64K HTTP packets
  5. Threat Prevention Throughput is measured with Firewall, Application Control, Bandwidth Management, IPS, and Anti-Virus enabled. 64K HTTP packets
  6. Web Application Protect Throughput is measured with Firewall, Application Control, Bandwidth Management, IPS and WAF enabled. 64K HTTP packets.
  7. IPsec VPN Throughput include Sangfor to Sangfor device connection scenario and Sangfor to 3rd party device scenario. 

 

NGAF Product Models

Models AF-1000-B1080* AF-1000-B1120* M4500 M5100 M5200 M5300 M5400 M5500 M5600 M5800 M6000 AF-2000-B3100* AF-2000-B3200* AF-2000-B3300*
Profile Desktop 1U Desktop 1U 1U 1U 1U 2U 2U 2U 2U 2U 2U 2U
Firewall Throughput1, 2 1.05 Gbps 1.75 Gbps 2
Gbps
2.8 Gbps 4.9 Gbps 12 Gbps 20 Gbps 25 Gbps 50 Gbps 67 Gbps 140 Gbps 140 Gbps 180 Gbps 240 Gbps
IPS+WAF Throughput(HTTP)1 N/A 700 Mbps 1.2
Gbps
1.4 Gbps 2.1 Gbps 3.85 Gbps 5.6 Gbps 8.4 Gbps 14 Gbps 21 Gbps 56 Gbps 63 Gbps 84 Gbps 126 Gbps
Threat Protection Throughput1, 4 600 Mbps 800 Mbps 1
Gbps
1.8 Gbps 2.1 Gbps 4.2 Gbps 5.6 Gbps 9.1 Gbps 18 Gbps 26.5 Gbps 67.2 Gbps 79.4 Gbps 91.2 Gbps 105 Gbps
NGFW Throughput1, 3 800 Mbps 1 Gbps 1.4
Gbps
2.5 Gbps 2.8 Gbps 5 Gbps 8.4 Gbps 12.6 Gbps 23 Gbps 31 Gbps 84 Gbps 90 Gbps 120 Gbps 140 Gbps
IPSec VPN Throughput1 100 Mbps 100 Mbps 250 Mbps 250 Mbps 375 Mbps 1 Gbps 1.25 Gbps 2 Gbps 3 Gbps 3.75 Gbps 5 Gbps 7 Gbps 10 Gbps 15 Gbps
Max IPsec VPN Tunnels 100 100 300 300 500 1000 1500 3,000 4,000 5,000 10,000 15,000 20,000 30,000
Concurrent Connections (TCP) 800,000 800,000 250,000 750,000 1,200,000 2,000,000 2,500,000 3,000,000 4,000,000 8,000,000 16,000,000 20,000,000 32,000,000 35,000,000
New Connections (TCP) 15,000 18,000 10,000 20,000 30,000 80,000 110,000 220,000 300,000 330,000 600,000 650,000 800,000 900,000
Power and Hardware Specifications
Support Dual Power Supplies N/A N/A N/A N/A N/A Yes Yes Yes Yes Yes Yes Yes Yes Yes
Power [Watt] Max 60W 40W 60W 40W 40W 60W 150W 150W 150W 150W 760W 860W 860W 860W
Model Datasheets
Click to Download N/A N/A pdf file pdf file pdf file pdf file pdf file pdf file pdf file pdf file pdf file N/A N/A N/A

* AF-1000-B1080, AF-1000-B1120, AF-2000-B3100, AF-2000-B3200, AF-2000-B3300 are only available in specific regions, please contact our local sale representatives for more details.

  1. All performance data is measured in the laboratory environment. The real-world performance may vary depending on the configuration & network environment.
  2. Firewall Throughput is measured with 1518 Bytes UDP packets.
  3. NGFW Throughput is measured with Firewall, Application Control, Bandwidth Management and IPS enabled.
  4. Threat Prevention Throughput is measured with Firewall, Application Control, Bandwidth Management IPS and Anti-Virus enabled.
  5. For More specification details, please check the Sangfor NGAF brochure or model datasheet.

Network Secure Success Stories

Below you will find all the Success Stories of Sangfor, classified by Industry, such as Enterprises, Governments, Schools & Universities, etc.

Meyer Aluminium (Thailand) Company Limited
Manufacturing & Natural Resources

Meyer Aluminium (Thailand) Company Limited

Multinet Trust Exchange LLC
Banking & Securities

Multinet Trust Exchange LLC

Medilife Health Group
Healthcare Providers

Medilife Health Group

Bundamedik Healthcare System BMHS, Indonesia
Healthcare Providers

Bundamedik Healthcare System BMHS, Indonesia

Meyer Aluminium (Thailand) Company Limited

Meyer Aluminium (Thailand) Company Limited

Multinet Trust Exchange LLC

Multinet Trust Exchange LLC

Medilife Health Group

Medilife Health Group

Bundamedik Healthcare System BMHS, Indonesia

Bundamedik Healthcare System BMHS, Indonesia

Customer Testimonials

image peer

Sangfor Network Secure Is Nothing Less Than No.1 As IT Security Protection

IT Manager of an Automative Industry

image peer

Quick Deployment, Easy To Use, And Practical Reports, Need More About Data Details

COO of a Media and Publishing Industry

image peer

Simple Operation And Maintenance, Rich Functions

Marketing Manager of IT Industry

image peer

Human-Machine Intelligence-Data Fusion Comprehensively Guarantees Safe Operation

CIO of a Industrial Company

image peer

Product Performance Very Good

Assistant IT officer from a Federal Government

Gartner Peer Insights Reviews for Sangfor Network Secure

image content
 

Network Secure NGFW Videos

Sangfor Network Secure Introduction: Technologies & Use Cases | Sangfor Product Series

video-image
Sangfor Network Secure Introduction: Technologies & Use Cases | Sangfor Product Series
video-image
Samudera Indonesia's IT Transformation: Powering Logistics Excellence with Sangfor Technologies
video-image
Unveiling IT Transformation at PT. CJ Indonesia | Sangfor Tech Talk
video-image
Innovation and Success: Sangfor x Universitas Pelita Harapan's Story
video-image
CEO of CyberRatings.org Explains Why Sangfor NGAF Achieved Recommended Ratings
video-image
Interview with IBA Karachi's Head of ICT Wajeeh Zaidi - Customer Testimonial
video-image
Interview with Jatin Doshi, BDM | Spollex Distribution Computer Trading LLC (UAE)
video-image
PT Bank Victoria International Tbk x Sangfor: Success Story

Get in Touch With Us

icon notification

Frequently Asked Question

A firewall is a network security tool that inspects and filters traffic between devices in a private computer network and the internet. Firewalls allow or deny incoming and outgoing network traffic based on defined rules. This enables users to block unauthorized data as well as prevent malware and other security threats from breaching the network.

Network Firewalls generally come as hardware network devices or software applications. Hardware firewalls are placed in a central network location to filter traffic for an entire network. Software firewalls are installed on endpoints to filter traffic to and from specific devices.

There are also different types of firewalls, including packet filtering firewalls, stateful inspection firewalls, proxy firewalls, network address translation (NAT) firewalls, and next generation firewalls (NGFW).

Next generation firewalls (NGFWs) are the newest generation of firewall technology. NGFWs use something called deep packet inspection (DPI) to inspect the content (payload) of data packets. This allows users to create more granular firewall rules based on specific types of data, applications, devices, and users.

Moreover, NGFWs are a type of unified threat management (UTM) solution. UTMs integrate multiple security features into one device. In the case of NGFW’s, this includes antivirus, intrusion detection system, threat intelligence, application control, email security, and more.

Traditional firewalls like packet filtering and stateful inspection firewalls only support rules based on packet header information, namely the source and destination IP address, protocol, and port number. This is very limited and does not offer much flexibility.

Next generation firewalls use something called deep packet inspection (DPI). DPI allows NGFWs to inspect the content (payload) of data packets and is a key enabler of enhanced firewall protection. One the one hand, users can create granular firewall rules based on specific types of data, applications, services, devices, and users. The allows NGFWs to block malicious data that exploit specific applications and services. DPI also provides the basis for the additional security features of NGFWs to function. With visibility into the data, antivirus can scan traffic for malware and the integrated intrusion prevention system can detect suspicious traffic activity.

Next generation firewalls are a type of unified threat management (UTM) solution that integrates multiple security features into one device. Typical features of NGFWs include:

  • Antivirus: Detects the presence of malware in traffic.
  • Intrusion Detection System (IDS): Detects suspicious traffic activity that might indicate an attack.
  • Intrusion Prevention System (IPS): Responds to detected suspicious traffic activity.
  • Threat Intelligence: Provides real-time threat intelligence to detect emerging threats.
  • Sandboxing: Executes suspicious files in a test environment to check for maliciousness.
  • Application Awareness and Control: Identifies applications and controls which apps are allowed to communicate with the internet.
  • URL Filtering: Blocks access to URLs that are malicious or unauthorized by the user.
  • Email Protection: Filters out malicious and unwanted email.
  • Web Application Firewall (WAF): A firewall dedicated to protecting web applications.

Granular Traffic Filtering: Thanks to DPI, next generation firewalls have visibility into the type of data and the applications, services, devices, and users processing the data. This allows organizations to create firewall rules to enforce granular access policies. DPI also enables NGFWs block malicious data that targets specific apps and services.

Early Threat Detection: NGFWs are integrated with security features like antivirus and intrusion detection system to detect malware and cyber-attacks before they can breach the network. This is important because threats are harder to detect after a breach, which increases the likelihood of a successful attack.

Security Logging: NGFWs support security logging, which is important for several reasons. For example, security analysts can analyze logs to hunt for threats that were missed by the firewall. Security logs are also needed to meet compliance requirements in certain industries and jurisdictions.

An organization should deploy a next generation firewall if compromise of its data and systems lead to material impact. This can be anything from significant financial loss, business downtime, business loss, and reputation damage. Given the sophistication of today’s security threats and the limitations of traditional firewalls to detect them, NGFWs should be the default firewall of choice for organizations looking for robust protection. NGFW vendors typically offer models of varying specifications and capabilities to suit the needs of different organizations, from small businesses to large enterprises.

Next generation firewalls provide superior protection to enterprise networks. This ultimately helps organizations minimize the chances of experiencing a cyber-attack. Considering how damaging cyber-attacks are, effective defense against them is vital for business continuity and prosperity.

NGFWs are also more cost-effective and reduce complexity by integrating various security features that would otherwise be deployed separately. This is especially beneficial for SMBs that lack the resources and expertise to deploy and manage disparate tools.

Next generation firewalls are relatively harder to use than traditional firewalls and may require a dedicated professional to operate and maintain. However, NGFW vendors are responsible for creating the complex firewall and IDS rules that detect and block security threats. Users simply need to keep their firewall up to date. NGFWs require extra work when organizations wish to create their own firewall rules, but NGFWs may come with templates to aid this process.

Because multiple security features are integrated into one device, NGFWs can be managed from a single interface. This in fact makes NGFWs easier to manage compared to separate security tools.

Next generation firewalls do a great job at keeping threats out of the network. However, cyber criminals are constantly refining and evolving their tactics, techniques, and procedures (TTP), so no single cyber security tool can always achieve total protection. That is why it is standard practice for organizations to deploy other security tools in addition to a firewall.

For example, antivirus or more advanced Endpoint Detection and Response (EDR) solutions are needed to detect threats that managed to evade the firewall and land on endpoints. For advanced persistent threats (APTs) that hide and spread in the network for a long period, a User and Entity Behavior Analytics (UEBA) solution like Network Detection and Response (NDR) works best.

NGFW vendors generally offer various models to suit different needs. Organizations should choose a firewall that fits their unique situation to get the best out of their NGFW. Important factors to consider include the NGFWs security capabilities, specifications such as throughput, cost, deployment mode, ease of operation, service, etc. For a more detailed discussion on choosing the right NGFW, feel free to read our enterprise firewall buyer’s guide.

Customer reviews are also an excellent source of reference. For example, Gartner Peer Insights provides vetted and verified reviews to help prospective buyers gain objective and trustworthy insight into the NGFW products of different vendors.