IPI Security as a Service (SECaaS)

Strong Protection, Faster Provisioning, and Cost Savings


IPI Layered Network Security Product

What is IP Instrument (IPI) ?IPI is a layered network security product as a service (SECaaS) for SME sized businesses. IPI aims to add different defense layers to the network infrastructure of organizations in the completion of productivity and efficiency.We are trying to provide a integrated security platform, and ultimately be like a canopy or an umbrella over the organization’s information and communication network.IPI, which is also offered as “Security as a Service”, has the capabilities to manage network communications communication at 3 levels:
  1. Edge Firewall With NGFW and Kangaroo
  2. Internal LAN Traffic with Hamster
  3. Client Applications with Koala and Kangaroo VPN
IPI Layered Network

1 - NGFW, Faster and Smarter

Nowadays, having multiple layers of security in place is crucial to protect your data at all levels and across multiple applications and devices. Layered security is a network security approach that uses several components to protect your operations with multiple levels of security measures. The purpose of a layered security approach is to make sure that every individual defense component has a backup to counter any flaws or gaps in other defenses of security. These layers work together to tighten security and have a better chance of stopping intruders from breaching your networks than using a single security solution.

The IPI NexGen Firewall provides instant, responsive, intelligent, and layered defenses against network malware and threats (As the first layer) . NGFW is a comprehensive response to the network security requirements of an enterprise network infrastructure. All modules of the NGFW are configured through a single management console. This interaction provides the most effective, way of easy-to-use and easy-to-configure approach. It facilitates contact points and policies throughout the organization by a centralized user interface. NGFW is, as Gartner defines it, a “deep-packet inspection firewall that moves beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall.” With the flexibility of the NGFW, it protects devices and companies from a much broader spectrum of intrusions.

We believe that our IPI NGFW is an essential component of any organization’s security architecture that can help protect sensitive data, meet compliance requirements, and guide organizations towards achieving digital transformation.

 

On the other hand, establishing secure and stable connections between the center and organizational branches (especially when you don’t have a Public/Static address) or when you need SDWAN communication infrastructure, requires a special type of VPN connection, which may be called DMVPN or DialUP-VPN. You know VPN, but in this product it is designed with a more attractive structure and is known as Kangaroo.

IPI NGFW

2 - Koala Client Application Control & Kangaroo

By installing Koala Application Control, IT managers and network administrators can prevent the operation and the execution of malware (Trojan, Spyware, etc), downloaders, social messengers, and all installed software on client’s PCs easily and without any concern about overheads and imposing heavy costs. They can set a specific bandwidth for each client. Finally, useful reports are always available about the activities of clients and applications. Koala solution includes two sections:

  • Koala Server
  • Koala Client

Koala server is the core of the client application control solution. Network administrators define the policies on the Koala server. All defined policies will be applied to the users by the Koala server. Koala servers can be located anywhere on the network. In general, the Koala server handles the following tasks:

  • Applying security procedures and policies to the clients
  • Creating handy reports about the performance of clients
  • Check new updates and distributing updates among clients

Koala Client is a Windows software. It runs as a service on the client’s PC. Koala Client receives all defined policies by admins of Koala Server. Then it applies those policies on the installed PC. The installation process can be easily handled by Domain Controllers when your organization is large.

 

There are also special models of dedicated VPN connections called Kangaroo for clients that are different from any model you’ve seen so far.

Koala- Application Control and Management centeralized
Kangaroo VPN

3 - Hamster, a Manager that Your LAN Loves!

Network administrators always spend the most money on external WAN communications  to limit unauthorized access to the network. It is obvious that hackers are not unaware of this issue. They know that infiltrating gateways is difficult and complicated. They always try not to waste their time with vain efforts and are a few steps ahead of network administrators; Their focus is now on your internal LAN. 

 

Firstly, In LANs, no special security solutions other than antivirus are usually used. Secondly, uninformed users are located mostly inside LAN. They can be a dangerous gateway to other penetrations. 

 

Our LAN Manager, called Hamster, is designed to secure the most important part of your network, your internal LAN. Hamster aims to manage communications on LANs. This product secures and encrypts whole network traffic between clients on a LAN. It applies security policies to TCP/UDP ports. It prevents information leakage, eavesdropping, the possibility of network intrusion, malware performance, and many other threats with the least overhead and the lowest cost.

 

The main feature of Hamster is controlling user’s access to the other network nodes. The other nodes can be another PC, any internal server in your organization, or even another bared hardware connected to your PC. It encrypts internal user’s communications by standard algorithms such as AES256, 3DES, and other. Hamster can isolate your intranet from the Internet on user’s PC. When you have guests in your company, you may want to prevent guest access to your internal network. Hamster can do it for you.

Hamster
IPInstrument Company

Who are we and what's our mission?​

The IPI team at IPInstrument has offered its products to the world, relying on years of experience and scientific background. Products that are designed based on the knowledge of founders, experts and tailored to the needs of this market and date have taken a good place in the vital IT infrastructure to rely on the goal of security and have a great contribution to the increasing promotion of cybersecurity.We combine our passion for cybersecurity with new software development techniques to provide the ultimate integrated platform for security at the various layers of an organization’s network.

Mission : At IP Instrument, we believe there is a better way to do network security. A more valuable, less invasive way where customers are earned rather than bought. We’re obsessively passionate about it, and our mission is to help our customers achieve it.

Vision : We’re excited to simplify layered network security for everyone through our software, education, and community. We do that by creating groundbreaking innovations, by making our products more sustainably, by building a creative and diverse global team, and by making a positive impact in communities and customers where we live and workTherefore, we tried to reach a great solution with a new idea and a creative look, which led to the production of the IPI product. A product that was presented as security as a service so that we can provide an integrated security platform and finally be like a canopy or umbrella on the information and communication network of the organization. A security product that controls and secures at least 3 layers of the network structure. At the client level, with KOALA, we can have complete control over the software and user programs. Then in the communication layer inside the LAN network with Hamster we can encrypt the internal communication and finally at the edge of the network with NGFW we can control and fix all the communication.

Long Term Goals : We are always looking to create new ideas and products so that we can respond to the needs as an important market developer. Our next goals include the following:
  • Cloud Security
  • IOT Security
  • SDWAN
  • Enterprise & Carrier Class