Autonomous Management Framework Security (AMF-Sec)
Promote this Nomination
Photo Gallery
![]() |
Autonomous Management Framework Security (AMF-Sec)

Additional Info
Company (that provides the nominated product / solution / service) | Allied Telesis |
Website | http://www.alliedtelesis.com |
Company size (employees) | 1,000 to 4,999 |
Type of solution | Software |
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:There are three key features that differentiate our solution from other vendors: |
Brief Overview
The conventional way to protect a network from attackers and threats is to use a firewall to inspect all traffic to and from the Internet. This is a very common design, which focuses on protection from the Internet, but leaves the network vulnerable to attacks from within the network itself, from connected endpoint devices and external media.
Ideally, a network would defend itself based upon the threat detected and the device that caused the problem. Enter the Allied Telesis AMF-Sec solution. We created this solution to work with your existing firewall to instantly respond to threats and automatically decide the appropriate reaction for any detected attack.
The major benefit of AMF-Sec is immediate and accurate threat response, without any manual intervention. Actions are configurable depending on the firewall event so that inadvertent visits to questionable webpages can be distinguished from malicious attempts to steal data.
Suspect endpoints can be automatically isolated whether they are wired or wireless, ensuring there are no weaknesses anywhere on your network. AMF-Sec does not require any special software or agents to be installed on the endpoint. Instead of shutting down the user’s device, we control the network to restrict access until remediation can be applied. We can block a threat emanating from a data center server just as easily as one from a mobile device.
AMF-Sec also monitors and protects traffic moving within a corporate network without adding unacceptable latency. Our solution allows the security appliance to monitor a copy of the traffic (i.e. “one-armed”) so no latency is introduced, and threats can be blocked instantly and automatically.