The Intrusion Prevention Feature of the Protector UTM Appliance?
Yes, you can easily blacklist (ban or block) or whitelist (approve or endorse) IP addresses via the Intrusion Prevention feature of the next generation UTM Firewall Appliance.
It is recommended to whitelist certain IP addresses if you have a SecPoint Penetrator Vulnerability Scanner or when you're doing penetration testing.
Otherwise, your IP addresses or the addresses of some of your employees and clients might be blocked by the Intrusion Prevention service.
The Firewall Module is quite handy because you are given the power to block specific IP ranges or even countries.
So if you are suddenly under attack from Nigeria (home of the Nigerian Prince email scam) you can block the whole country's IP addresses.
Are only part of what the SecPoint Protector is capable of.
It can also serve as a malware protection application blocking, and content filtering solution that truly showcases what a firewall is capable of when it is allowed to evolve into UTM territory.
Unified Threat Management is a self-explanatory term, after all; instead of having different services for web filtration, malware protection, IP analysis, IP whitelisting and blacklisting, and whole country IP blocks, nothing beats making use of a UTM central hub that's capable of all these wonderful services and more.
What's more, the Protector is a cost-effective, easy-to-use, and scalable appliance that is a perfect fit for businesses of all sizes.
Net ne'er-do-wells, and cyber criminals will have a hard time hacking or cracking through the defenses of your system while you have the monitoring, reporting, viral/worm/adware/spyware/spam removal, content filtration, web security agents, web policy enforcement, and IP banning capabilities of the comprehensive and complete SePoint Protector UTM appliance.
More to the point, a bored script kiddie with a downloaded script will not be able to wreak havoc on even the smallest online startup companies around as long as they have the Protector on hand to blacklist his IP (even if it is a dynamic one).
Ditto when it comes to Denial of Service (DOS) or Distributed Denial of Service (DDoS) attacks.