813.603.4311 sales@dataconnex.com

Network Based Firewall

Fully Managed

A fully managed, scalable network security service that helps you reduce risk and control costs. Lower CapEx and OpEx investments by leveraging DataConnex’s infrastructure and security experts.

Highly Secure

Protect your cloud servers and applications as well as your Internet-connected MPLS locations from serious threats. Our SSAE 16 SOC2 certified data centers guard against inbound and outbound security threats and control how employees use company resources.


Gain a First Line of Defense for your Security Strategy.

Security is about managing the confidentiality, integrity and availability of an organization’s information. Our solutions provide the controls and safeguards needed to limit the risk of unauthorized exposure, destruction, modification or unavailability of your vital business data, customer records and proprietary information. If your company is connected to the Internet, it is crucial to have a solid defense solution in place.

Our Network Based Firewall service provides a dedicated firewall instance in a carrier-class multi-tenant hardware platform to protect your hosted services and Internet-connected MPLS locations from both inbound and outbound security threats. With DataConnex Network Based Firewall services, you get 24/7/365 monitoring and protection services from the latest vulnerabilities as well as documented policy change requests and approvals to ensure that the appropriate policies are applied and enforced.

Supports Multiple Domains

Flexibility to create custom configurations and multiple secure environments (domains) on the high-capacity platform.

Keeping Your Data Safe

Security features include stateful inspection, antivirus anti-malware and anti-spyware, intrusion prevention service, application control, unlimited policy changes, monthly reporting, configuration backup and restore, basic vulnerability assessment to help keep your data safe.

Security Monitoring

We monitor 24/7/365 to protect you from the latest vulnerabilities and ensure that the appropriate policies are applied and enforced through documented policy change request and approval process.