Arrow offers secure, guaranteed and precise data transfer from a restricted and well-protected network to a more open and accessible space. All your valuable data is encrypted, de-fingerprinted and transmitted, masked if necessary.
Data is becoming the most important asset of organizations day by day. While the value of companies is measured by the amount of accurate data, condoning data leakage can cause rapid reputational damage in the blink of an eye, and money and effort are wasted. Today is the age of communication. While very fast, secure and integrated communication has become today's most basic standard, it determines the winner and the loser. We need to find a tremendous balance between data security and access. In this way, our daily operations can continue without jeopardizing corporate and government values, operational performance, and even military secrets.
With Arrow's modular software architecture and licensing model, it provides easy integration, does not require the purchase of unnecessary features from the first day, and does not incur hardware replacement costs in case of performance needs. The flexible software infrastructure developed by Angora Engineering Team allows for custom solutions. So you are not constrained by a limited set of functions.
Visibility
Arrow comes as two sisters. It offers the service of Guardian and Postman devices standing on different networks. The guard receives the data in the restricted network, prepares it for secure transmission, and finally sends it to his brother. The postman receives the data and forwards it to the final destination or stores it for access and download. Optionally, it may be possible to work with more than one Postman. In addition, devices may vary according to different bandwidth, disk and volume options.
Layered Security
Protocol-based security can be applied to different data streams. In hierarchical layered structures, task-based operation definitions can be made for users with different authorizations. All users can provide data masking and metadata protection with security options. Admin and authorized superiors can set protocol, file type, file size etc for users below them. can make customizations separately.
Wide Protokol Support
There is no limit to the amount of data that can be created on restricted networks. Documents, photographs, footage, management protocols, sensor data, and even very sensitive military information may need to be relocated as needed. Arrow architecture at the most basic license level, file transfer (PDF, DOCX, JPEG etc.), syslog, snmp, scada, http, https etc. supports protocols. Actually, protocol support is not a problem for Arrow. Enhancements can be made to handle traffic of any protocol.
ICAP Integration and Licensing
Arrow is designed to transfer your data accurately and securely. Provides reporting to prevent data leakage. It follows the movements of the people and notifies the relevant top manager in case of a possible violation. It also removes fingerprints on the transferred data.
However, in cases where all these are not enough, it maximizes the security of the file to be moved by exchanging data with external security devices with ICAP support.
With the function-based license model, you only have the functions you need. It supports your hardware needs. If your functional needs change and your hardware is not sufficient, hardware change is provided without any expense.
One Way Warranty Hardware
Arrow guarantees one-way data transfer thanks to its special hardware structure. With the unidirectional fiber transfer modules developed by Angora Network, sending traffic in the opposite direction is physically blocked. Unlike other copper interface or SFP interface devices, it is not possible to provide software feedback.
Arrow hardware is guaranteed to support owned function licenses. If the licenses require more than the current hardware performance, hardware replacement will be done by Angora Networks. .
Extendable Function Set
Angora Networks lives up to its promises. Your needs require special solutions and no one can force you to the features of their product. Rather, your needs must be met. Different companies with special needs can request the transport of their traffic for the new protocols at no additional cost. At Angora, we know very well that different types of business are subject to different solutions and are not the only result when it comes to security. That's why we offer the necessary new protocol support for free
Technicial Specifications
Attribute | Description |
Operating System | Debian-based Angora OS |
Protocol Support | Web File Transfer, Samba, Syslog, SNMP, Scada, Web API, HTTP,HTTPS etc. |
Security | PKI Encryption, Fingerprint removal, data masking, quarantine, hierarchical structure |
User management | Prioritization, subordinate/parent association, user-based feature access, integration with directory services, file type control, protocol type control, quota management |
Logging | Transfer log, usage violation, SIEM integration, alarm management, external communication with API
|
External Application Support | ICAP based antivirus, antimalware, DLP |
Management | Web interface, RestAPI, Mobile application |
Customization | Protocol support, registrations, custom solutions |