Answering Questions
  to Improve Our Customer’s Experience


  • What is a DPI Firewall?

    The Deep Packet Inspection (DPI) Firewall is the last generation of firewall type which can stop evolving cyber-attacks by scanning the entire network packet including the payload regardless of directions or protocols. The DPI firewall provides better security visibility and more advanced featuress than other firewall types.

  • What is a Stateful Inspection Firewall?

    The Stateful Inspection Firewall is a type of firewall that scans only the network packet header. This makes this type of firewall less effective in preventing advanced cyber-attacks.

  • What type of firewalls do most today’s UTMs and NGFWs use?

    The Stateful Inspection Firewall is the foundation of most today’s UTMs, and some NGFWs. Advanced NGFWs are offering some varities of DPI firewalling but with shortcomings of peformance, prices , multiple security devices and higher maintenance costs.

  • What is the difference between DPI Firewall and Deep Packet Inspection feature?

    The Deep Packet Inspection (DPI) Firewall is an emerging and advanced firewall type which can stop evolving cyber-attacks by scanning the entire network packet including the payload. On another hand, the deep inspection technology is a feature that comes with most stateful inspection firewalls and DPI firewalls to decrypt and encrypt TLS/SSL traffic. This technology enables firewalls to examine the network packet using the firewall security mechanism.

  • What are the TG8’s deployment models?

    TG8 engines are offered in appliances, software (VM or ISO Image) and cloud services.

  • Why is TG8 not listed on Gartner?

    Currently, we are focusing on developing new features and security techniques to protect businesses. We understand the marketing exposure Gartner can give us, but cybersecurity professionals are smart enough these days to value TG8 technology when it is presented to them.

  • Is TG8 NSS lab certified?

    We had a plan to apply for this in 2020, but unfortunately the NSS Lab shut down then. Luckily, the budget for this was directed to TG8 research and development.

  • Who are your competitors?

    We believe that all security vendors should cooperate and integrate their products. Every company can offer different security techniques to protect their customers from cyber-attacks. We are open to cooperation and integration. If a company takes a competitive approach, it’s hard to compete with the TG8 team’s passion for cybersecurity.

  • How long has TG8 technology been on the market?

    The first enterprise installation of a TG8 engine was in late 2018. Ever Since, TG8 has been going strong protecting businesses in various industries and in many countries.

  • Who is behind TG8?

    A network of highly experienced cybersecurity programmers is working together to address cybersecurity trends and develop the latest features network security and cybersecurity gateways. Founded in the State of Texas, USA, TG8’s products are offered and supported worldwide through channel partners.

  • Why was TG8 developed?

    TG8 was developed to meet today’s cybersecurity requirements for business gateways, specifically for enterprises and service providers. It has addressed many of the drawbacks of UTM and NGWF technologies in terms of advanced security, performance, and cost.

  • What types of partners do you prefer?

    We are constantly evaluating partners in all countries. We prefer companies with network security experience supported by a good technical team who already provide solutions in their respective countries. We are ready to train and share security knowledge with an experienced team.

  • Who are the customers of TG8?

    TG8 engines offer cybersecurity gateways for small to large sized companies. With its unique technology, TG8 engines can cater to the requirements of many specific sectors including Banking, Telecom/ISP, Government, Healthcare, Education, and Enterprises.

  • How would my business benefit from the technology alliances that TG8 has adopted?

    The purpose of TG8 technology alliances is to integrate TG8 models with other common companies in the cybersecurity space. This will harden the security position of businesses and enable them to retain their existing investment.

  • Do you have a job for me?

    Most jobs we have are in programming. We require extensive experience in cybersecurity, C, and Unix programming. For those countries who are keen enough to start an initiative using TG8 technology, many internships for fresh graduates and for experienced site engineers will become available.

  • What are the TG8 Products (engines) and what is the job of each?

    TG8 consists of end-to-end engines with full functionality.  Each engine works on its own device or can coexist with other engines on the same device without compromising performance or security.

     

    The main engines are:

    • DPI Firewall to prevent exploitation, advanced network-based attacks and DoS/DDos attacks
    • VPN to provide secure connections either from site to site or client to site
    • SD-WAN to manage network traffic and improve bandwidth
    • WAF to protect your websites from OWASP attacks
    • Antivirus gateway to prevent downloading files with viruses
    • Web filtering to categorize Internet websites and manage the access to these sites
    • Application control to prevent certain Internet applications
    • Http(s)Internet website scanning to prevent users from bringing malware embedded in Internet websites to your network
    • Email security to prevent cyber-attacks directed toward your business by using email and its contents
    • Security Monitoring to gain network security visibility and trace the root cause of incidents
  • What makes the TG8 Antivirus engine is different?

    The TG8 Gateway Antivirus engine can scan any downloaded files regardless of their sizes. This can be down without compromising performance. This engine applies more than 10 million signatures to make it the most effective gateway antivirus on the market.

  • Where do I deploy TG8 engines?

    You should install them in your datacenter to protect your servers and storage with DPI firewall as a first or second layer. In addition to that, you can install TG8 engines on the network’s edge as a second layer or the layer to protect your business from Internet attacks.  You should install data security engines either inline or in proxy modes. You also can deploy TG8 All-In-One Protection with multiple TG8 engines on a device to simplify and reduce security operations.

  • What do you mean by TG8 being scalable?

    The goal of TG8 devices is to protect more users without changing the device. For example, if you have TG8 for 500 users and you later add 200 users on your network, you need only to apply for the extra license without replacing the purchased appliance.

  • What do you mean by parallel processing, multithreaded and distributed processing?

    These TG8 technology features are inherited in its programming architecture.

    Parallel processing is the capability of TG8 to process the same packet on all engines at the same time.

    Multithreaded is the capability of a TG8 engine to process more than one packet at a time..

    Distributed processing is the capability of TG8 architecture to distribute network traffic among multiple IPS engines.

  • How would I decide on which solution to choose from TG8?

    To decide which TG8 solutions you adopt, you need to address some key factors:

    • Your existing security protection on the gateway level
    • Any previous or currently occurring incidents
    • Your network security strategy and plan
    • Number of network users
    • Your network internet speed
    • Your security risk tolerance and risk management strategies
    • Your budget
  • Do I need to install software agents on the clients to trace incidents?

    You do not need to install any agent on your endpoint devices.

  • How could I evaluate TG8 VPN site to site or client to site against other vendors?

    You can ask for a demo. VPN security is standard for all companies. The best way to test the effectiveness of your TG8 VPN is to ping your other end device and compare the latency and speed to your connection without VPN.

  • How would the integration feature help my business?

    It saves your existing investment and allows you to combine your preferred security technology with TG8s. For example, if you already have Sandboxing technology or Threat Intelligence, TG8 will use this.

  • Do I have to activate the license if I go with redundancy?

    You only need to activate your license when you use it.

  • What happens if I let my license lapse?

    When you reactivate, the license will start tracking the number of days from the time you activate and not from the time the license expired.

  • Can I go with one engine and add other engines in the future to the same device?

    Yes, you can do that without affecting throughput or security of other engines.

  • What is the difference between UTM technology and TG8 Engines?

    UTM is a stateful inspection firewall technology that mainly uses security techniques applied to the frame header. It uses security gateway components and has limited functionality. If you enable any of these security components, the throughput of the whole device goes down drastically. On the other hand, TG8 is a deep packet inspection firewall technology that applies security techniques on both the packet header and the payload simultaneously and prevents advanced attacks. TG8 also uses firewall session intelligence which include rules based policy techniques to prevent DoS/DDoS attacks. UTM technology uses the session table to handle DoS/DDoS attacks. The drawback of session table technology is that the firewall tends to go down once the DoS/DDoS attack is in progress.  UTM doesn’t keep up with today’s enterprise requirements in terms of performance and security.

  • What is the difference between NGFW technology and TG8 Engines?

    Most NGFWs use the same technology as UTMs with Stateful Packet Inspectiong Firewall, some varities of DPI firewalling, IPS and antimalware . One of the challenges of NGFWs is the latency which requires customers to have other network security devices to protect their organizations.

  • How can I apply TG8 transfer licensing?

    If you have one device with a TG8 license, you can transfer this license to other devices.

    For example, if you have TG8 subscribed for a model in your main datacenter and another TG8 device installed in your disaster recovery site, you don’t need to activate the license in your DR since you are not using it. Whenever you need to use your DR,  you may transfer the datacenter license and use it temporary for the DR. After restoring the main datacenter, you are able to transfer the license back to the original device.

  • Does TG8 run its parallel processing and multithreaded technology on a single PC CPU?

    Yes, the TG8 features of parallel processing and multithreaded are inherited on the programming level.

  • Can I run all TG8 engines on one device without compromising the throughput and security?

    Yes, the throughput of the device is seamless regardless of how many engines you run on the same device.

  • Do I need a separate hardware to run the security monitoring function?

    No, each engine comes with its own built-in analytics and reporting module.

  • How can I test if TG8’s engines will meet my requirements?

    If you have intermittent incidents, you can test TG8 for a month or so to see if it solves these incidents. You can run TG8 alongside your existing or preferred UTM or NGWF and compare log files.  Also, you can check the speed and the performance of TG8 engines as compared to other companies.

  • I already have a NGFW or UTM, do I still need TG8 engines?

    It depends on your security risk tolerance or current incidents. UTMs and NGFWs are stateful inspection firewalls which scan only the IP header of the packet. Many attacks these days are embedded in the data frame, mainly the payload. TG8 engines offer advanced features to prevent malware embedded in the contents of external websites from ending up on your network devices. Also, the TG8 Email Security Engine offers advanced technology to filter email content and prevent the use of email in launching advanced cyber-attacks.

  • What is the difference between Web Security and Web Application Firewall (WAF)?

    Web Security refers to applying TG8 engines such as antivirus, web filtering and Http(s) content scanning, to protect your users from attacks occurring from surfing the internet. WAF on the other hand, is protecting your own website(s) from attacks targeting your website server components.

  • What hardware specifications do I need if I choose to go with any of TG8 VM/ISO Image versions?

    It depends on the number of users, TG8 engines and your existing network topology. A typical installation serving up to 1000 users, will require a normal Core i7 PC with 2 Ethernet cards and 16 GB  RAM. There is no need for any operating system or VM. However, you may install TG8 on your existing VM server if needed.

  • Should I go with the TG8 appliance or the VM/ISO Image version?

    The TG8 VM/ISO image version using your hardware will give you the same performance and security as the appliances. The strength of TG8 architecture is the inherited programming techniques.  Which method you choose depends on your network topology and the number of network connections needed.

  • Do I need a certain TG8 model to apply the TG8 SD-WAN engine?

    All TG8 models come with TG8 SD-WAN engine by default.

  • Why don’t you use a third-party antivirus for your antivirus engine?

    Most well-known antivirus are meant to be installed on the endpoint or servers. The characteristics of antivirus software running on the gateway level are special. The most essential element is the speed needed in order to keep up with the required network performance for today’s applications.

  • Does the TG8 firewall engine protect my business from DoS/DDoS?

    Yes, the TG8 firewall comes with firewall session intelligence technology. Unlike other technology, this technology is a policy-based rule which is immune to DoS/DoDS attacks.

  • I already have UTM or NGFW installed, but why do I continue to experience attacks and other incidents on my network?

    You need to look at some of the easiest ways that cyber criminals pass their attacks onto your network. From the gateway side, most of these incidents are coming from internet websites or email. Many UTM or NGFW can’t stop fragmented or fileless attacks. Also, many email security gateways can’t prevent phishing or other advanced email attacks.

  • Does TG8 support SSL protocol for site-to-site VPN connections?

    Yes, it does and there is no need to purchase SSL certification. The TG8 VPN comes with this certification. According to many security analysts, SSL is more secure than IPSec protocol.

  • What is the difference between web filtering and Http(s) content scanning?

    Web Filtering allows you to control the categories of the websites that your users visit. This may stop bad URLs but it won’t scan external website contents.  The HTTP(s) scanning, on the other hand, protects your business from Internet malware ending up on your IT infrastructure when your users browse the Internet.

  • How easy is it to configure and maintain TG8 engines?

    TG8 is easy to configure and maintain.  TG8 comes with many easily applied and modified pre-configured profiles containing the most commonly used best practices.

    The true deep packet inspection technology firewall allows you to deal with names rather than IP addresses. For example, if you want to block Psiphon VPN software, you only need to add name of the software without figuring out the IP address of that application.

  • What options do I have in deploying TG8 engines?

    TG8 engines offer deployment of its engines on appliances, VM/ISO platform, and in the cloud.