Hillstone CloudHive Simplifies the Management of Cloud Security

Hillstone Networks is pleased to announce version 2.7.2 of CloudHive. In this release, CloudHive improves its availability of orchestration module and comes with features to further simplify the management and maintenance of virtualized networks. Feature Highlights vSOM supports active/passive deployment for high availability  Ability to import and export configuration files Ability to import and export…

Unleash the Power of X10800 With New Service and I/O Modules

Hillstone Networks is pleased to announce the release of new service and I/O modules (SIOM*) for Hillstone’s innovative Data Center Firewall X10800. The modules greatly enhance the X10800 by providing higher performance, density and capacity, lower cost, better stability and easier configuration. The expansion modules combine the functionalities of two types of existing modules: the…

Strengthen the Log Management with New HSA Platform

We are proud to announce the release of the Hillstone Security Audit (HSA) platform, version 2.9.0. This new version comes with a new high-end hardware model which completes our product offerings in security audit. HSA 2.9.0: The New Model HSA-10D Highlights: High performance in log processing: Up to 100,000 EPS for binary logs Up to…

Secure SD-WAN for Broader Business Scenarios with Hillstone HSM 4.4.0

We have reached another milestone of Secure SD-WAN Solution with this new release of the Hillstone Security Management (HSM) platform – version 4.4.0. The enhanced Secure SD-WAN Solution provides on-demand network orchestration capabilities along with other features that give control to admins to more easily deploy and better create and manage their SD-WAN networks. Secure…

Continued Enhancements in Threat Detection Capabilities

Server Breach Detection System (sBDS) from Hillstone Network is an effective cyber defense tool to detect threat attacks and protect critical servers and other assets inside the corporate intranet. It integrates a suite of threat detection engines that uses traditional security techniques including NGFW, IPS, IDS, AntiVirus as well as behavioral analysis based anomaly detection…