top of page
InstantPush™ - Central Management & Report

Security deployments are complex and can overload IT teams with complex security rules and mountains of data from multiple sources. InstantPush™ central management empowers you with easy-to-implement, consolidated policy creation and centralized management features. Set up and control L7 devices centrally with industry-leading functionality and an efficient rule base, and gain insight into network-wide traffic and threats.


InstantPush™ offers the tool you need to manage multiple appliances and gain valuable insights on inbound and outbound link traffic. From within a single management console you can configure and manage multiple Instant series appliance using our Windows or Linux based central management utility.

Centralized Policy Management


InstantPush™ network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, user identification, file blocking and data filtering.

Centralized Reporting


InstantPush™ network security management enables you to control your distributed network of our L7 from one central location. View all your firewall traffic, manage all aspects of device configuration, push global policies, and generate reports on traffic patterns or security incidents — all from a single console.

InstantPush™ is available either as a dedicated management appliance or as a virtual machine.


In summary, InstantPush™ provides:

  • Streamlined policy management

  • Simplified operations

  • Unparalleled network and threat visibility

  • Comprehensive log collection including logs from all your L7 devices and endpoints

  • Flexible deployment options

Traffic Monitoring: Analysis, Reporting and Forensics


InstantPush™ pulls in logs from distributed L7 devices, both physical as well as virtual, and from L7's endpoints and stores them in its own log storage. As you perform log queries and generate reports, InstantPush™ dynamically pulls the relevant logs from its log storage and presents the result to the user.

  • Log viewer: For an individual device, all devices or Traps, you can quickly view log activities using dynamic log filtering by clicking on a cell value and/or using the expression builder to define the sort criteria. Results can be saved for future queries or exported for further analysis.

  • Custom reporting: Predefined reports can be used as is, customized, or grouped together as one report in order to suit specific requirements.

  • User activity reports: A user activity report shows the applications used, URL categories visited, websites visited, and all URLs visited over a specified period of time for individual users. InstantPush™ builds the reports using an aggregate view of users’ activity, no matter which L7 device they are protected by, or which IP or device they may be using.

bottom of page