The first 100% automated firewall offering in the cloud
Secure your network, your data & your users
Sewan relies on a firewall cluster from Fortinet* to provide you with a complete integrated security solution. You choose to administer the firewall or to delegate its management to Sewan. You get optimal protection with the many state-of-the-art features of Cloud Firewall.
*Fortinet is the leader in network security solutions and unified systems
For more details:
![]() ![]() |
||
![]() ![]() |
![]() |
![]() ![]() |
![]() |

One Fortinet Firewall Cluster in high availability
Sewan integrates a Fortinet Firewall Cluster in the network core, based on NP ASICs.(Network Processor). This exclusive technology hardware-accelerateds the processing of your data to ensure the best performance and lowest latency in the market.

Power and simplicity
Unified threat management(UTM) in combination with the functional richness of a New-Generation Firewall(NGFW) gives you the highest level of security. You can manage your security policies in real time through your practical and intuitive administration interface(drag and drop, context menus, smart search etc.).

Administer or delegate
Manage your security policy as you wish: manage your firewall directly from your dedicated interface, or leave the management of your firewall to the Sewan experts.

Firewall per session

Proxy
The firewall includes Proxy i.e. the caching of web pages or objects in order to improve the performance of your web browsing.

Remote Access
Manage and secure external access to your network according to your usage. Mobile users, remote sites or secure access to your applications, the complete functionalities of the Cloud Firewall IPSec and SSL(in tunnel or portal mode), are at your disposal to establish the secure connections you need.

Anti-intrusion

Antivirus
The Cloud Firewall's integrated antivirus is a complete solution to eliminate a wide spectrum of attacks and malicious activity including viruses, Trojans, worms, spyware, botnets, grayware and adware. It uses dual detection based on both signature-based and heuristic analysis algorithms(analysis of a program's supposed behaviour to determine whether or not it is a virus).

URL and protocol filtering

Application management
Application flow recognition is based on real-time traffic analysis and mapping to a database of signatures embedded on the equipment and referencing more than 3,500 applications divided into large families to simplify and optimize your security policy.