Logo
/
Sign in
Product Logo
genugate VirtualBundesdruckerei

Virtual high‑resistance firewall providing certified network protection for sensitive and classified environments in virtual infrastructures.

Product details

genugate virtual is a software‑based high‑resistance firewall designed for deployment in virtualized IT environments. It provides the same security architecture and protection concepts as the hardware‑based genugate firewall while offering increased flexibility for modern data center and cloud‑like infrastructures. The solution enables secure separation of network zones, controlled data flows, and encrypted communication in environments with elevated security requirements. It is intended for public authorities, critical infrastructure operators, and organizations that require high‑assurance network security combined with virtualization technologies.

Key Features

High‑Resistance Firewall Architecture Designed to withstand advanced threat scenarios.

  • Hardened, security‑focused system design
  • Minimized attack surface

Virtual Appliance Deployment Optimized for virtual infrastructures.

  • Runs on common virtualization platforms
  • Flexible placement within virtual networks

Stateful Packet Inspection Controls traffic at the connection level.

  • Stateful inspection of network sessions
  • Fine‑grained rule configuration

Application‑Level Security Provides deeper traffic validation.

  • Proxy‑based protocol handling
  • Protocol conformity checks and filtering

Secure Network Segmentation Enforces strict separation between zones.

  • Multi‑zone and multi‑level security architectures
  • Controlled communication paths between trust domains

VPN Functionality Enables encrypted communication channels.

  • IPsec‑based VPN connections
  • Secure site‑to‑site and inter‑segment connectivity

Certified Cryptographic Mechanisms Meets high security standards.

  • Approved encryption algorithms
  • Compliance with national security requirements

Centralized Administration Simplifies management in complex environments.

  • Central rule and policy management
  • Logging and auditing support

Benefits

Flexible High‑Security Deployment Adapts high‑resistance security to virtual environments.

  • No dedicated hardware required
  • Suitable for dynamic infrastructures

Protection Against Sophisticated Attacks Designed for high‑risk scenarios.

  • Defense‑in‑depth security approach
  • Strong isolation between network segments

Regulatory and Classification Compliance Supports regulated use cases.

  • Designed for classified information environments
  • Meets governmental security expectations

Efficient Infrastructure Integration Fits modern IT architectures.

  • Integrates into existing virtual networks
  • Supports software‑defined infrastructure concepts

Operational Consistency Provides uniform security behavior.

  • Comparable functionality to hardware firewall variants
  • Consistent policy enforcement across environments