-
[2023 October Tips & Tricks] Why deprecate L2TP over IPSec in the USG FLEX H Series?
Why deprecate L2TP over IPSec in the USG FLEX H Series? L2TP over IPSec was a popular VPN protocol in the past, but it has become less common and is often deprecated and discouraged for several reasons: Security Concerns: It does NOT provide encryption or confidentiality to traffic passing through it. It relies on other…
-
[2023 September Security Monthly Express] Why choose the SCR 50AXE for network protection?
Why choose the SCR 50AXE for network protection? Looking for an easy-to-use, affordable, secure, and up-to-date security solution? The Zyxel SCR 50AXE is the perfect choice for you. Unlike most security gateways, the SCR 50AXE has WiFi built-in, so you can enjoy the benefits of the latest WiFi 6E with 6 GHz network. It…
-
[2023 August Tips & Tricks] SCR 50AXE: How to Enjoy Guest WiFi in Minutes
Do you want to provide internet access to your customers or guests without compromising your network security? Do you want to create a positive impression and build loyalty with your visitors? Do you want to leverage your WiFi network for marketing and customer insights? If you answered yes to any of these questions, then…
-
[2023 August Security Monthly Express] Zyxel firewalls support SafeSearch
SafeSearch, such as Google SafeSearch, is primarily designed to provide a safer browsing experience, especially in environments where users may want to avoid explicit or inappropriate content like workplace or educational environments. In ZLD5.37, Zyxel firewalls support SafeSearch from Google, YouTube, and Microsoft Bing…
-
[2023 July Security Monthly Express] How Zyxel keeps your IP surveillance devices secured
In the era of the Internet of Things, the security issues of networked devices are constantly being emphasized. Among them, the security issues of network cameras (IP CAM) are one of the most concerned devices. While enterprise networks may be a primary target due to their larger scale and potential impact, small and…
-
[2023 June Security Monthly Express] 7 Easy Ways to Reduce Your Attack Surface
7 Easy Ways to Reduce Your Attack Surface As securing your networks has always been Zyxel's top priority, our security experts constantly work on adding new features and collaborating with cybersecurity researchers to address and investigate potential security exploits that may affect our products. In this article, we…
-
[2023 May Security Monthly Express] A simpler approach to security & WiFi 6E
The ransomware attack is increasing Small businesses and teleworkers are facing numerous challenges in securing their networks and data in the new normal. Cyber threats like ransomware and malware can cause significant damage to a company's reputation, finances, and operations. Small businesses often struggle with finding…
-
[2023 May Tips & Tricks] See how Zyxel optimizes your VPN experience
What is a Route-based VPN? Route-based VPN is a type of VPN architecture that uses routes and policies to direct and control traffic between different VPN endpoints. In this type of VPN, the routing table is used to determine the best path for each packet of data, rather than relying solely on security policies. In a…
-
[2023 Mar. Security Monthly Express] Every Network Professional thinks “this security” is must-have
70% of Threats Can Be Stopped by Reputation Filter Service While running a daily business, it is possible to become a victim of a well-known cyberattack like WannaCry, botnets, Cryptojacking, and many more. Cyberattacks never stop and the risk spikes up when your network isn’t patched up. IP Reputation technology…
-
[2023 Mar. Tips & Tricks] SecuReporter Customized Report 2.0 Releases - I see. I analyze. I report.
At the end of 2022, Zyxel SecuReporter helped over 30,000 companies to monitor business networks worldwide. The SecuReporter team is committed to updating your report with the most advanced features so that you and your business can enjoy it! This latest release further enhances SecuReporter's report including: New cover…
-
[Tips & Tricks] Store system logs for you ATP/USG FLEX firewall on an USB stick
Store
system logs for you ATP/USG FLEX firewall on an USB stick One
best practice for IT professionals is to constantly keep track of logs, in case
you will need it for diagnostics of a particular system problem or network
issue. Simply
plug a USB storage disk into the USB port on the ATP/USG FLEX firewall, you’ll
get a…
-
[2023 Feb. Security Monthly Express] What is Sandboxing and Why Do You Need It?
Malware
is becoming more complicated, stealthy, and automated than ever. They can generate more
versions of a piece of malware faster than we can write definition forms which
would be the traditional way we do it. Every day, the AV-TEST Institute registers over 450,000 new malicious
programs (malware) and potentially…
-
[2022 Issue 10] Why browsers can be a security loophole?
Modern
browsers and latest operating systems are using new encryption technologies –
DNS over TLS (DoT) and DNS over HTTPS (DoH) – to combat against unauthorized
DNS services. It can be a great tool for privacy protection, but it would also open
up potential threats for your organizations and IT professionals. This…
-
[Tips & Tricks] Building Configuration Files Protection into Zyxel firewalls
There are several
configuration features on Zyxel security appliances that require some
protection. In ZLD5.35, the Zyxel firewalls are built with security in mind, by
adding an extra layer of password protection when the administrators want to
access the configuration files. How to enable Configuration
Files Protection?…
-
[Tips & Tricks] See how Zyxel can level up your IoT Security
What is IoT Security? IoT
Security is protection of the Internet of things and the network they’re in
from threats. It also monitors risks all while helping avoid vulnerabilities in
the devices that would cause security risks to your business. Security Risks to Your IoT
Network We
know the benefits and value IoT devices…
-
[2022 Issue 17] Why endpoint security is important? (Release Date: 2022-12)
Why
endpoint security is important? In
today’s world of rapidly evolving, tech staff are already under heavy
workloads, leaving little time to hunt down Endpoint threats from such as laptops,
desktops, smartphones, and tablets; they can all become potential attack
vectors, so that’s why it’s important to understand what…
-
[Tips & Tricks] Did you know USG FLEX now supports Reputation Filter?
As
you may know, USG FLEX already supports URL threat filters since the beginning
of the release. As part of our
commitment to providing you with better and more efficient protection services,
USG FLEX series now supports Zyxel Reputation Filter service, consisting of IP
Reputation, DNS threat filter, and URL threat…
-
[2022 Issue 16] Zyxel Threat Intelligence (Release Date: 2022-11)
ZyWALLs
latest virus/malware signature update protect you against more malware and
threats. See how ZyWALL
defends against these threats. Part 1 – Virus/Malware Spotlight Part 2 – Intrusion Detection Highlight Part 3 – Application Patrol Highlight This article focuses on Trojan.BitCoinMiner.
Part 2 and 3 will be included…
-
[2022 Issue 15] New and Thorough! USG FLEX Protection From Head to Toe!
New
and Thorough! USG FLEX Protection from Head to Toe! The business world as of today is still contemplating the
new reality of what a post-pandemic future might look like. Hybrid work models that allow employees to work from home or from
other places outside of office are welcomed as a change by many companies…
-
[Tips & Tricks] See how Zyxel resolves the WAN / LAN subnet conflict
The typical network
topology looks like the image below when we install a firewall into the network. Users directly connect the WAN port of the firewall
to an external ISP router using an Ethernet cable. What causes subnet conflicts? In cases of using the Zyxel USG FLEX/ATP firewall series,
the default setting of the WAN…