Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:security
|
gptkbp:can |
Network activity
|
gptkbp:can_be_configured_for |
High availability
Traffic shaping Management software User roles Access control lists Enforce security policies Log events Block malicious traffic |
gptkbp:deployment |
Virtual appliance
Hardware appliance |
gptkbp:developed_by |
gptkb:Tigo
|
gptkbp:features |
Traffic monitoring
Intrusion detection |
gptkbp:has |
Web interface
|
https://www.w3.org/2000/01/rdf-schema#label |
Tigo Firewall
|
gptkbp:integrates_with |
Other security solutions
|
gptkbp:is_available_in |
Multiple regions
|
gptkbp:is_compatible_with |
Various operating systems
|
gptkbp:is_compliant_with |
Industry standards
|
gptkbp:is_designed_for |
Small to medium businesses
|
gptkbp:is_documented_in |
User manuals
|
gptkbp:is_evaluated_by |
gptkb:Compliance_Management
Performance metrics Security vulnerabilities |
gptkbp:is_integrated_with |
Cloud services
Threat intelligence feeds |
gptkbp:is_managed_by |
IT administrators
|
gptkbp:is_monitored_by |
Security operations center
|
gptkbp:is_part_of |
gptkb:Cybersecurity
gptkb:Risk_Management IT infrastructure Network infrastructure Network segmentation Tigo's security suite |
gptkbp:is_scalable |
Larger networks
|
gptkbp:is_supported_by |
gptkb:Documentation
Technical support team |
gptkbp:is_tested_for |
gptkb:performance
gptkb:Reliability Scalability Threats |
gptkbp:is_updated_by |
Firmware upgrades
|
gptkbp:is_used_by |
Enterprises
|
gptkbp:is_used_to |
Control access
Secure remote access Protect sensitive data Mitigate threats Monitor network health |
gptkbp:is_utilized_for |
Incident response
Data loss prevention |
gptkbp:offers |
Real-time alerts
Reporting tools DDo S protection |
gptkbp:provides |
User authentication
Network security Policy management |
gptkbp:supports |
VPN connections
IPv4 and IPv6 Content filtering |
gptkbp:used_in |
Corporate networks
|
gptkbp:bfsParent |
gptkb:Tigo_Colombia
|
gptkbp:bfsLayer |
7
|