About EdgeSentinel
10 min
edgesentinel by sea street is a cloud native security platform designed to be hosted and delivered directly on provider networks with a powerful control plane and next generation firewalls deployed as virtual network functions (vnfs), edgesentinel weaves protection into every layer of the network fabric, offering unmatched, multi layered security architecture control plane cloud native easy to deploy can deploy on any hyperscaler or hypervisor scalable out of box scalability of the underlying microservices elastic autonomous elasticity to expand and contract based on the load on the platform api first design rest apis openapi compliant used to generate docs and test clients easy integration with existing orchestrators microservice architecture flexible ability to add new micro services (i e a new security service requirement) add new api endpoint based on customer need toggle which services are available per deployment edgesentinel security threat hub > dynamically updates threat intelligence feeds across the entire fw deployment element manager > controls a fleet of enforcement points open source nextgen firewall functionality automation of day 1 and day 2 fw configurations network config on fw initial security setup add/remove services updates to services platform overview key features threat intelligence, your way edgesentinel brings you the power of advanced threat intelligence, offering seamless integration with a wide range of threat intelligence feeds this flexibility enables service providers to incorporate industry leading feeds or their own custom sources, creating a tailored intelligence layer by leveraging this adaptable approach, service providers can proactively identify and neutralize cyber threats before they reach the network with edgesentinel , your defenses adapt in real time to the constantly changing threat landscape, ensuring that your network remains secure while maintaining optimal performance policy services adjust security policies to meet unique network requirements with edgesentinel , service providers have the tools needed to deploy precise, adaptable policies across their infrastructure the security policy services described below all feature northbound api integration with edgesentinel , enabling seamless incorporation into a service provider's marketplace or user interface geo ip geo ip filtering is a security measure that restricts or allows access to network resources based on the geographic location associated with an ip address this method uses geolocation data to identify the country or region of the ip address, enabling organizations to block or permit requests from specific locations it helps prevent unauthorized access, reduce fraud risks, and ensure compliance with regulations, thereby enhancing overall security for both users and systems edgesentinel simplifies the initial configuration of a geo ip dataset, providing organizations with a comprehensive list of geographic ip address allocations to enhance their security measures by dynamically refreshing the dataset, edgesentinel ensures that organizations can respond swiftly to emerging threats and changing user behaviors this capability enables security teams to implement effective geo ip filtering policies, allowing them to block or permit traffic based on real time geographic data as a result, organizations can mitigate risks from high threat regions while facilitating legitimate access from trusted locations, thereby strengthening their overall security posture ip/domain manager edgesentinel empowers organizations to configure specific actions for ips or domains according to client requirements by enabling customized access controls, edgesentinel ensures that clients can effortlessly access the resources they need without interruptions this flexibility enhances user experience and strengthens overall network security, allowing organizations to efficiently manage their digital environments while meeting individual client needs service control edgesentinel gives administrators the power to create precise firewall rules based on source and destination ip/port, and protocol — the core attributes that define how packets move across the network service control enforces these rules instantly, allowing or blocking traffic designed for the more sophisticated users, service control provides the flexibility to craft highly targeted policies reporting and logging the reporting and logging feature provides organizations with comprehensive visibility into their network traffic this feature facilitates informed decision making by capturing and analyzing relevant data key aspects include traffic logging automatically records detailed information about network traffic passing through the firewall, including connection attempts, allowed and blocked traffic, and policy changes, enabling thorough investigation and analysis reporting generates customizable reports that summarize network activities, compliance metrics, and statistics over specified periods, helping organizations identify trends and assess the effectiveness of their security measures by leveraging the reporting and logging feature, organizations can enhance their security management, quickly identify and respond to threats, and ensure adherence to regulatory requirements version control the version control feature allows organizations to manage and track changes to security policies and configurations over time this feature provides a systematic approach to maintaining an organized history of revisions, making it easier to revert to previous versions if necessary and ensuring that any changes can be audited for compliance and security purposes key components of the version control feature include change tracking automatically records changes made to security policies or configurations, capturing details such as timestamps, the user making the change, and the nature of the modifications rollback capability enables users to revert to earlier versions of policies or configurations quickly, minimizing downtime or disruptions caused by unintended changes or errors audit trails generates comprehensive logs of all changes, providing transparency and accountability this is crucial for compliance with industry regulations and internal security standards by integrating version control with our security services, organizations can enhance their ability to manage security policies effectively, improve collaboration among team members, and maintain a secure and compliant environment
