Frequently Asked Questions

Currently, we are focusing on developing new features and security techniques to protect businesses. We understand the marketing exposure Gartner would give us, but cybersecurity professionals are smart enough these days to value TG8 technology when it is presented to them.

We had a plan to apply for this in 2020, but unfortunately the NSS Lab shut down then. Luckily, the budget for this was directed to TG8 research and development.  

We believe that all security vendors should cooperate and integrate their products. Every company can offer different security techniques to protect from cyber-attacks. We are open to cooperation and integration. If a company takes a competitive approach, it’s hard to compete with TG8 team’s passion for cybersecurity.

The first enterprise installation of a TG8 engine was in late 2018. Ever Since, TG8 has been going strong protecting businesses in various industries and in many countries. 

A network of highly experienced cybersecurity programmers who are working together to address cybersecurity trends and develop the latest features in the cybersecurity gateways. These programmers follow the vision and direction of Mr. Ibrahim Al-Jararheh, who has experienced the evolution of network cybersecurity technologies since 1995. TG8 is a registered trademark of ToGrow in the United States of America.

TG8 was developed to meet today’s cybersecurity requirements for business gateways, specifically for enterprises and service providers. It has addressed many of the drawbacks of UTM and NGWF technologies in terms of advanced security, performance, and cost. 

We are constantly evaluating partners in all countries. We prefer companies with network security experience supported by a good technical team who already provide solutions in their respective countries. We are ready to train and share security knowledge with an experienced team. 

TG8 engines offer cybersecurity gateways for small to large sized companies. With its unique technology, TG8 engines can cater to the requirements of many specific sectors including Banking, Telecom/ISP, Government, Healthcare, Education, and Enterprises. 

The purpose of TG8 technology alliances is to integrate TG8 models with other common companies in the cybersecurity space. This will harden the security position of businesses and enable them to retain their existing investment. 

Most jobs we have are in programming. We require extensive experience in cybersecurity, C, and Unix programming. For those countries who are keen enough to start an initiative using TG8 technology, many internships for fresh graduates and for experienced site engineers will become available.     

TG8 consists of end-to-end engines with full functionality. Each engine works on its own device or can coexist with other engines on the same device without compromising performance or security.

Main engines are:

  • Firewall/IPS to prevent exploitation and DoS/DDos attacks
  • VPN to provide secure connections either from site to site or client to site
  • WAF to protect your websites from OWASP attacks
  • Antivirus gateway to prevent downloading files with viruses
  • Web filtering to categorize Internet websites and manage the access to these sites
  • Application control to prevent certain Internet applications
  • Http(s)Internet website scanning to prevent users from bringing malware embedded in Internet websites to your network
  • Email security to prevent cyber-attacks directed toward your business by using email and its contents

You should install them in your datacenter to protect your servers and storage as a first or second layer. In addition to that, you can install TG8 engines on the network's edge as a second layer or the layer to protect your business from Internet attacks.  You should install data security engines either inline or in proxy modes.

The goal of TG8 devices is to protect more users without changing the device. For example, if you have TG8 for 500 users and you later add 100 users on your network, you need only to apply for the extra license and potentially add some RAM. 

These TG8 technology features are inherited in its programming architecture. Parallel processing is the capability of TG8 to process the same packet on all engines at the same time.  Multithreaded is the capability of a TG8 engine to process more than one packet at a time..  Distributed processing is the capability of TG8 architecture to distribute network traffic among multiple IPS engines.  

To decide which TG8 solutions you adopt, you need to address some key factors:

  • Your existing security protection on the gateway level
  • Any previous or currently occurring incidents
  • Your network security strategy and plan
  • Your security risk tolerance and risk management strategies
  • Your budget

You do not need to install any agent on your endpoint devices. 

You can ask for a demo. VPN security is standard for all companies. The best way to test the effectiveness of your TG8 VPN is to ping your other end device and compare the latency and speed to your connection without VPN. 

It saves your existing investment and allows you to combine your preferred security technology with TG8s. For example, if you already have Sandboxing technology or Threat Intelligence, TG8 will use this. 

You only need to activate your license when you use it.

When you reactivate, the license will start tracking the number of days from the time you activate and not from the time the license expired. 

Yes, you can do that without effecting throughput or security of other engines. 

The Deep Packet Inspection Firewall has the capability of scanning the entire packet including the IP header and the payload. Unlike stateful inspection firewalls on the market, TG8 is a deep packet inspection firewall. On the other hand, deep packet inspection technology works on the data security level and inspects TLS/SSL encrypted traffic. TG8 enables DPI technology and uses the DPI Firewall while maintaining high performance.

UTM is a stateful inspection firewall technology that mainly uses security techniques applied to the frame header. It uses security gateway components and has limited functionality. If you enable any of these security components, the throughput of the whole device goes down drastically. On the other hand, TG8 is a deep packet inspection firewall technology that applies security techniques on both the frame header and the payload simultaneously and  prevents advanced attacks. TG8 also uses firewall session intelligence which include rules based policy techniques to prevent DoS/DDoS attacks. UTM technology uses the session table to handle DoS/DDoS attacks. The drawback of session table technology is that the firewall tends to go down once the DoS/DDoS attack is in progress.  UTM doesn't keep up with today’s enterprise requirements in terms of performance and security.

Most NGFWs use the same technology as UTMs with only the firewall, IPS and VPN components activated. They are still stateful firewall technology with more hardware resources added to have higher throughput to meet today’s network bandwidth needs. Some NGWF companies claim their technology use deep packet firewall technology, but still rely on the packet header alongside scanning the application layer in the data frame. They don’t scan the payload. The throughput is still a major concern for NGFWs especially when they use deep packet inspection technology.  Session table technology is still used, and these firewalls rely on the hardware resources to speed up the performance. 

If you have one device with a TG8 license, you can transfer this license to other devices.

For example, if you have TG8 subscribed for a model in your main datacenter and another TG8 device installed in your disaster recovery site, you don’t need to activate the license in your DR since you are not using it. Whenever you need to use your DR, you may transfer the datacenter license and use it temporary for the DR. After restoring the main datacenter, you are able to transfer the license back to the original device.

Yes, The TG8 features of parallel processing and multithreaded are inherited on the programming level.

Yes, the throughput of the device is seamless regardless of how many engines you run on the same device.

No, each engine comes with its own built-in analytics and reporting module. 

If you have intermittent incidents, you can test TG8 for a month or so to see if it solves these incidents. You can run TG8 alongside your existing or preferred UTM or NGWF and compare log files.  Also, you can check the speed and the performance of TG8 engines as compared to other companies.

It depends on your security risk tolerance or current incidents. UTMs and NGFWs are stateful inspection firewalls which scan only the IP header of the packet. Many attacks these days are embedded in the data frame, mainly the payload. TG8 engines offer advanced features to prevent malware embedded in the contents of external websites from ending up on your network devices. Also, The TG8 Email Security Engine offers advanced technology to filter email content and prevent the use of email in launching advanced cyber-attacks.

Web Security refers to applying TG8 engines such as antivirus, web filtering and Http(s) content scanning, to protect your users from attacks occurring from surfing the internet. WAF on the other hand, is protecting your own website(s) from attacks targeting your website server components.

It depends on the number of users, TG8 engines and your existing network topology. A typical installation serving up to 1000 users, will require a normal Core i7 PC with 2 Ethernet cards and 16 GB  RAM. There is no need for any operating system or VM. However, you may install TG8 on your existing VM server if needed.  

The TG8 VM/ISO image version using your hardware will give you the same performance and security as the appliances. The strength of TG8 architecture is the inherited programming techniques.  Which method you choose depends on your network topology and the number of network connections needed. 

Most well-known antivirus are meant to be installed on the endpoint or servers. The characteristics of antivirus software running on the gateway level are special. The most essential element is the speed needed in order to keep up with the required network performance for today’s applications.

Yes, The TG8 firewall comes with firewall session intelligence technology. Unlike other technology, this technology is a policy-based rule which is immune to DoS/DoDS attacks. 

You need to look at some of the easiest ways that cyber criminals pass their attacks onto your network. From the gateway side, most of these incidents are coming from internet websites or email. Many UTM or NGFWfirewalls can’t stop fragmented or fileless attacks. Also, many email security gateways can’t prevent phishing or other advanced email attacks. 

Yes, it does and there is no need to purchase SSL certification. The TG8 VPN comes with this certification. According to many security analysts, SSL is more secure than IPSec protocol.

Web Filtering allows you to control the categories of the websites that your users visit. This may stop bad URLs but it won't scan external website contents.  The HTTP(s) scanning, on the other hand, protects your business from Internet malware ending up on your IT infrastructure when your users browse the Internet. 

TG8 is easy to configure and maintain.  TG8 comes with many easily applied and modified pre-configured profiles containing the most commonly used best practices.<br>The true deep packet inspection technology firewall allows you to deal with names rather than IP addresses. For example, if you want to block Psiphon VPN software, you only need to add name of the software without figuring out the IP address of that application. 

TG8 engines offer deployment of its engines on appliances, VM/ISO image, and in the cloud. 

Request a Demo

Select The TG8 Gateway Engines