Logo
/
Sign in
Product Logo
genuscreenBundesdruckerei

Firewall and VPN appliance providing controlled network access and encrypted communication for environments with high security requirements.

Product details

genuscreen is a combined firewall and VPN appliance designed to secure network communication in organizations with elevated security demands. It controls data flows between network segments and protects internal systems from unauthorized access originating from external or less trusted networks. The solution enables encrypted communication across public infrastructures by establishing virtual private networks while enforcing strict, rule‑based traffic control. genuscreen supports the separation of security domains within complex network architectures and is suitable for environments that require formally approved protection mechanisms for sensitive or classified information.

Key Features

Firewall Enforcement Controls network communication at defined interfaces.

  • Stateful packet inspection
  • Rule‑based filtering of network traffic

VPN Functionality Provides encrypted data transmission.

  • Secure site‑to‑site connections
  • Encrypted remote access communication

Network Segmentation Separates trust zones within networks.

  • Isolation of internal and external network areas
  • Controlled communication between segments

High‑Security Architecture Designed for sensitive environments.

  • Hardened operating system
  • Minimal and clearly defined attack surface

IPv4 and IPv6 Support Supports modern network protocols.

  • Dual‑stack operation
  • Consistent security policies across protocols

Centralized Management Simplifies administration of multiple systems.

  • Central configuration and policy management
  • Monitoring and logging of security‑relevant events

Benefits

Secure Communication Protects data during transmission.

  • Encrypted connections over public networks
  • Reduced risk of data interception

Controlled Network Access Limits exposure to external threats.

  • Only explicitly permitted traffic is allowed
  • Clear enforcement of security policies

Support for Regulated Environments Meets strict security requirements.

  • Suitable for classified and sensitive information
  • Supports compliance with governmental regulations

Flexible Deployment Adapts to different network designs.

  • Perimeter firewall or internal segmentation
  • Integration into existing infrastructures

Operational Stability Designed for continuous use.

  • Predictable and stable behavior
  • Suitable for critical network functions