Connect with us

Hi, what are you looking for?


Network Security

Stonesoft To Launch Next Generation Firewall For The Battlefield

Firewalls deployed in neatly-stacked racks protected by thick concrete walls within climate controlled datacenters have it nice. Not all firewalls are so lucky, and some have it rough—literally.

Firewalls deployed in neatly-stacked racks protected by thick concrete walls within climate controlled datacenters have it nice. Not all firewalls are so lucky, and some have it rough—literally.

Network security vendor Stonesoft on Tuesday announced a new Next Generation Firewall designed for military deployments in harsh environments that provides military-grade network security in a rugged unit designed to go anywhere–even hostile environments where freezing temperatures, sand or moisture are likely to render most security appliances useless.

Stonesoft MIL-320 FirewallAccording to the company, the new Stonesoft MIL-320 Next Generation Firewall utilizes the company’s “data stream-based normalization and deep inspection” across all protocols and network layers to detect and prevent cyber attacks, including those that come by way of attackers using Advanced Evasion Techniques.

The tough looking MIL-320 appliance packs advanced network security features into a tough and compact unit, certified for high-performance operations in extreme environments. The heavy-duty units are designed to be able to run in extreme temperatures, wet, mud and dust, and be resistant to frequent bumps and shocks.

With military technology often deployed outside controlled datacenters and other stable environments, the need to protect data and communications in extreme conditions is a frequent requirement.

“Armed forces have a particular, life-saving need for the rapid mass deployment of security appliances in hostile conditions,” the company said.

“Signals and network defense specialists in the modern military are required to facilitate distributed operations with robust, secure, high-performance networks that enable situational awareness, reliable communications, and even collaborative working and office tools in the field,” the company continued.

The MIL-320 offers protection against sophisticated attacks and includes a WLAN and ad-hoc mesh network support for resilient, strongly encrypted local communication links and data transfer between deployed units, the company said.

Advertisement. Scroll to continue reading.

Additionally, the MIL-320 provides features like the capability for using custom encryption ciphers from a connected USB stick, and is straightforward to deploy in mechanized forces, infantry or in fixed installations.

While military deployments may be the first environments that come to mind when it comes to needing a durable security appliance, other industries that operate in extreme and rough environments can benefit from the MIL-320 as well.

“In storm force conditions on the dockside, at temporary border crossings, in law enforcement, remote depots, major events, underground rail links, on land and sea, intelligent network security is vital to protect the data flow, safety and wellbeing of businesses and societies,” the company said.

“You can drop [the MIL-320] from the helicopter or drive over it with a tank and you will stay secured,” said Antti Kuvaja, Director, Product Management at Stonesoft.

Pricing details are not yet available, but the Stonesoft MIL-320 is scheduled to be available for shipping in the beginning of 2013.

Helsinki, Finland-based Stonesoft also has a North American headquarters in Atlanta, Georgia.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...