Virtual Infrastructure Firewalling

Virtualization and the Cloud have transformed how IT is run in almost every company. Not only does virtualization and the Cloud change how hardware resources are utilized, it also changes where data is stored as well as the "topology" and borders in the network.

Using these fantastic technologies can make companies more agile, cost-effective and competitive. However, with new technologies come new challenges. Security, without a doubt, is often one of the top challenges in Cloud computing. 

Without proper security built into the virtual and cloud infrastructures, there's a large risk of a devastating security breach with all its consequences, perhaps even more damaging than in a classic physical network. With more resources consolidated and separated from classic firewalling and network segmentation infrastructure, a ransomware or hacker can spread to more servers and data in shorter time and with fewer layers of security inspection. 

What you can expect

The Solution

Clavister Virtual Series can be used in an enterprise-virtualized environment to establish protected zones in an otherwise open environment. This means that the virtual security gateway is used in a virtual environment in order to establish security zones for different areas of the virtual network, which contains information of different security classifications.

The Clavister Virtual Series can be used to establish protected zones for the HR, R&D, Sales and Finance departments, all in the same Cloud environment. The Clavister Virtual Series can also be used in order to create zones for different functional groups, e.g. Web Servers, Database Servers, and ERPs. Each department can even have their own firewall, which simplifies calculations on cost distribution within the enterprise.

For this solution it's a lot about doing the same tasks one would do with a physical firewall in a physical network, including compliances by having access control enforced with a firewall and logging/auditing for the traffic that passes through the perimeters between different servers. 

Features and Capabilities


  • Maximize the utilization of your resources

    No need to build multiple clouds/isolated islands of virtual clusters just to overcome security issues. Minimize the wasted capacity due to in-effective network design and security challenges. 

  • Ensure privacy and avoid data leakage

    Secure and private end-to-end VPN encryption between users and cloud resources. 

  • Reduced risk for security breaches

    Reduces the risk for a security breach such as a traffic overload attack or other DoS attacks. Minimize the risk of a virus or security breach spreading from one virtual machine to another without any protection between them. 

  • Simplified administration

    No need to end up with thousands of complex policies in one "big" firewall, instead provisioning "small" dedicated virtual firewalls for each logical department, making administration more managable and straightforward. 

  • Simplified cost calculations for internal IT

    Each Department can have their own firewall which simplifies calculations of cost distribution within the enterprise. Having more firewalls might sound like more administration but in reality it means simpler and more straightforward than having one big firewall with thousands of policies.