What's New in R82.10

Introduction

Enterprises are rapidly adopting AI to achieve impressive productivity gains. However, AI systems also introduce unprecedented new security challenges. Traditional detection and response frameworks are no longer enough to protect today’s distributed, hybrid mesh networks. It is imperative that enterprises shift left to prevention-first security. R82.10 enables security for the AI transformation, Hybrid Mesh Network, and advanced threats.

R82.10 delivers stronger threat prevention, higher scalability & performance, and greater operational simplicity.

Architectural Updates: R82.10 features an upgraded OS based on Linux kernel 5.14 versus 4.xx in previous releases. This release runs exclusively in UPPAK mode (User Space Performance Pack).

Stronger Threat Prevention

  • Protection from HTML Smuggling: Zero Phishing Software Blade introduces a powerful new capability to detect and block HTML smuggling, an advanced cyberattack technique that avoids firewall detection by building malware locally within a target's web browser.

  • Expanded DNS Protection: Introduces DNS-over-TLS threat prevention to block malicious DNS activity over encrypted channels.

  • MCP Detection and Visibility: Introduces MCP (Model Context Protocol) detection and visibility to ensure that only authorized MCP communications are allowed across the network.

  • Enhanced Drop Templates: New drop templates improve resilience by reducing CPU usage to enable blocking a much higher volume of denial of service (DoS) attacks while maintaining maximum throughput for permitted traffic.

  • 4 New ThreatCloud AI Engines: PDF security with advanced image and text analysis, malicious GitHub-hosted account and repository detection, automatic creation of file and IPS protection rules, and a new web security model with enhanced decision-making capabilities.

  • Adaptive IPS: A new optimized IPS defense profile is tailored to fit an organization’s exact requirements. This enables IPS to be turned on with minimal CPU performance impact, for improved resiliency and threat detection.

Scalability & Performance

Operational Simplicity

  • Centralized Identity Management: Infinity Identity is a cloud service that integrates with Quantum network security, provides the option of integrating with multiple identity providers, and eliminates the need for separate management portals. It integrates endpoint device and device security posture data from Microsoft Intune, Microsoft Defender, CrowdStrike Falcon, Harmony Endpoint, and more for consistent and unified zero-trust access control.

  • New Access Policy Log Generation Modes: New logging mode enables streamlined control over daily log output, with improved granularity into log levels and analytics on high-volume rules. The Aggregated mode greatly reduces daily log volume by up to 70%, reducing storage needs accordingly.

  • Simplified Route-Based VPN: Automatically configures Site to Site VPNClosed An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN. based on network topology, enabling one-click setup and dynamic routing with BGP.

  • Enhanced Web-based UI: New web-based UI allows users to manage common security use cases from the web for more flexibility.

Threat Prevention

Threat Prevention Insights

Zero Phishing

  • Zero Phishing Software Blade provides prevention for customers without HTTPS Inspection, utilizing Server Name Indication (SNI) in TLS handshake.

  • Zero Phishing Software Blade introduces a powerful new capability to detect and block HTML Smuggling, a technique used by threat actors to bypass traditional Network Threat Prevention systems.

ThreatCloud AI Engines

  • Threat Emulation PDF Engine

    The updated PDF engines combine advanced image and text analysis.

    • Image analysis: QR code extraction, page-layout parsing, brand misuse detection resilient to adversarial obfuscation, and adult-content heuristics.

    • Text analysis: an SLM (Small Language Model) flags social-engineering patterns in forms, lures, and conversational tone.

    • Brand detection: adversarial image obfuscation techniques.

  • GitHub Abuse Engine - Designed to detect malicious GitHub-hosted accounts and repositories used for credential theft and drive-by malware downloads. The engine uses advanced algorithms and AI to analyze user behavior, repository structure, key files, and JavaScript content through deep code inspection.

  • AI Web Security (New model) - The latest version of the AI web security engine features enhanced decision-making capabilities across web traffic by combining DNS metadata, certificate attributes, and behavioral signals.

  • Generative AI Protections Engine - Automates the creation of File and IPS protection rules by processing open-source intelligence and ThreatCloud traffic. It generates protection rules automatically, eliminating manual effort and accelerating the protection delivery. By reducing analysis time from days to hours, it enhances threat response and expands coverage with minimal human intervention.

DNS Security

  • Introducing DoT (DNS over TLS) - Threat Prevention capabilities for malicious DNS activity over the TLS protocol.

HTTPS Inspection

  • Added support for the hybrid PQC-safe key exchange group "X25519MLKEM768" (combining X25519 and ML-KEM768 algorithms) within HTTPS Inspection.

  • HTTPS Inspection now supports Hardware Security Module (HSM) integration for TLS 1.3, ensuring secure storage and management of private keys during encrypted traffic inspection.

  • Rule Base Hit Count is now available for HTTPS Inspection policies, improving visibility and administrative control.

IPS

  • New capability that automatically detects and remediates CPU-intensive IPS protections with a dedicated SmartView dashboard displaying IPS bypass statistics and CPU-intensive protection insights.

Quantum Security Gateway

Identity Awareness

URL Filtering

Site to Site VPN

Security Gateway Enhancement

Dynamic Routing

  • Added support for these Dynamic Routing features:

    • Support for up to 256 PIM interfaces, which allows greater flexibility and scalability in network configurations.

    • Support for up to 500 BGP peers, ensuring robust and efficient routing capabilities.

    • Support for BGP Large Communities, which provides enhanced control and management of routing policies across multiple networks.

Cluster and Scalability

Internal CA

Gaia OS Security

Quantum Security Management

Logging and Monitoring

Compliance